1. Alexa Internet Inc: The top 500 sites on the web, March 2015.
http://www.alexa.com/topsites
2. Bortz, A., Boneh, D.: Exposing private information by timing web applications. In: Williamson, C.L., Zurko, M.E., Patel-Schneider, P.F., Shenoy, P.J. (eds.) Proceedings of the 16th International Conference on World Wide Web, WWW 2007, Banff, Alberta, Canada, May 8–12, 2007. pp. 621–628. ACM (2007).
http://doi.acm.org/10.1145/1242572.1242656
3. Felten, E.W., Schneider, M.A.: Timing attacks on web privacy. In: Gritzalis, D., Jajodia, S., Samarati, P. (eds.) CCS 2000, Proceedings of the 7th ACM Conference on Computer and Communications Security, Athens, Greece, November 1–4, 2000, pp. 25–32. ACM (2000).
http://doi.acm.org/10.1145/352600.352606
4. Google Inc.: Android 4.4 platform optimizations.
https://source.android.com/devices/tech/low-ram.html
(Feb 2015)
5. Gullasch, D., Bangerter, E., Krenn, S.: Cache Games - Bringing Access-Based Cache Attacks on AES to Practice. In: IEEE Symposium on Security and Privacy - S&P, pp. 490–505. IEEE Computer Society (2011).
http://dx.doi.org/10.1109/SP.2011.22