1. Čeleda, P., Krejčí, R., Vykopal, J., Drašar, M.: Embedded malware - an analysis of the chuck norris botnet. In: European Conference on Computer Network Defense, 1. Vyd, pp. s. 3–10, 8 s. IEEE Computer Society, Los Alamitos (2010). ISBN 978-1-4244-9377-7, doi:
10.1109/EC2ND.2010.15
2. Lizard stresser runs on hacked CCTV cameras — Krebs on Security.
http://krebsonsecurity.com/2015/01/lizard-stresserruns-on-hacked-home-routers/
3. Daily Tech - Hackers Use Refrigerator, Other Devices to Send 750,000 Spam Emails.
http://www.dailytech.com/Hackers+Use+Refrigerator+Oter+Devices+to+Send+750000+Spam+Emails+/article34161.htm
4. Software defaults as de facto regulation: The case of wireless aps. In: The 33rd Research Conference on Communication, Information, and Internet Policy (2005).
http://web.si.umich.edu/tprc/papers/2005/427/TPRC%20Wireless%20Defaults.pdf
5. SSLSTRIP.
www.thoughtcrime.org/software/sslstrip/index.html