1. Lecture Notes in Computer Science;K.D. Bowers,2012
2. cnet.com: Comodo hack may reshape browser security (April 4, (2011),
http://news.cnet.com/8301-31921_3-20050255-281.html
3. van Dijk, M., Juels, A., Oprea, A., Rivest, R.L.: FlipIt: The game of “stealthy takeover”. Cryptology ePrint Archive, Report 2012/103 (2012)
4. Falliere, N., Murchu, L.O., Chien, E.: W32.Stuxnet Dossier (February 2011),
http://www.symantec.com/connect/blogs/w32stuxnet-dossier
5. Finkle, J., Shalal-Esa, A.: Hackers breached U.S. defense contractors (May 27, 2011),
http://www.reuters.com/article/2011/05/27/us-usa-defense-hackers-idUSTRE74Q6VY20110527