1. Al-Qasem, I., S. Al-Qasem, and A. Al-Hammouri, 2013. Leveraging online social networks for a real-time malware alerting system. In: Proceedings of the 38th IEEE conference on local computer networks, Sydney, AU, October, 272–275.
2. Angwin, J. 2014. Dragnet nation: A quest for privacy, security, and freedom in a world of relentless surveillance. New York: Times Books.
3. Anonymous. 2012, July. The collateral damage of Internet censorship by DNS injection. ACM SIGCOMM Computer Communications Review, 42(3):22–27.
4. Brenner, S., and L. Clarke. 2011. Civilians in cyberwarfare: Casualties. http://works.bepress.com/susan_brenner/3 . Accessed 1 Nov 2011.
5. Burnham, G., R. Lafta, S. Doocy, and L. Roberts. 2006, October 11. Mortality after the 2003 invasion of Iraq: A cross-sectional cluster sample. The Lancet, 368(9545):1421–1428.