1. Alazab, M., Venkatraman, S., Watters, P., Alazab, M., & Alazab, A. (2012). Cybercrime: The case of obfuscated malware. In C. K. Georgiadis, H. Jahankhani, E. Pimenidis, R. Bashroush, & A. Al-Nemrat (Eds.), Global security, safety and sustainability & e-democracy. E-democracy 2011, ICGS3 2011. Heidelberg: Springer.
2. Boes, S., & Leukfeldt, E. R. (2017). Fighting cybercrime: A joint effort. In R. Clark & S. Hasim (Eds.), Cyber-physical security (pp. 185–203). New York: Springer International Publishing.
3. Brenner, S. (2001a). State cybercrime legislation in the United States. Richmond Journal of Law and Technology, 7. Available at:
http://scholarship.richmond.edu/jolt/vol7/iss3/4
.
4. Brenner, S. (2001b). Is there such a thing as ‘virtual crime. California Criminal Law Review, 4. Available at:
http://scholarship.law.berkeley.edu/bjcl/vol4/iss1/3
.
5. Brenner, S. W. (2002). Transnational evidence gathering and local prosecution of international cybercrime. John Marshall Journal of Computer and Information Law, 20, 347–295.