1. Ablon L, Libicki MC, Golay AA (2014) Markets for cybercrime tools and stolen data: Hackers’ bazaar, Rand Corporation. Available at: http://www.rand.org/content/dam/rand/pubs/research_reports/RR600/RR610/RAND_RR610.pdf . Accessed 29 November 2015
2. Allen Bradley (2016) Logix5000 controllers generals instructions reference manual. Available at: http://literature.rockwellautomation.com/idc/groups/literature/documents/rm/1756-rm003_-en-p.pdf
3. Anderson C (2015) Considerations on Wassenaar arrangement control list additions for surveillance technologies, Access. Available at: https://cda.io/r/ConsiderationsonWassenaarArrangementProposalsforSurveillanceTechnologies.pdf . Accessed 7 July 2015
4. Bacchus M, Coronado A, Gutierrez MA (2014) The insights into car hacking. Available at: http://web.eng.fiu.edu/~aperezpo/DHS/Std_Research/Car%20Hacking%20-%20eel%206931%20final.pdf . Accessed 20 Feb 2017
5. Böhme R (2005) Vulnerability markets. In: Proceedings of 22C3, vol 27, p 30