1. Alexander, J.S., Dean, T., Knight, S.: Spy vs. spy: Counter-intelligence methods for backtracking malicious intrusions. In: Proceedings of the 2011 Conference of the Center for Advanced Studies on Collaborative Research, CASCON ’11, pp. 1–14. IBM Corp, Riverton, (2011)
2. Apvrille, A.: Cryptography for mobile malware obfuscation. http://www.fortiguard.com/files/FNMS-305-Apvrille-Revised.pdf (2011)
3. Barbera, M., Kosta, S., Stefa, J., Hui, P., Mei, A.: Cloudshield: Efficient anti-malware smartphone patching with a p2p network on the cloud. In: 012 IEEE 12th International Conference on Peer-to-Peer Computing (P2P), 2, pp. 50–56 (2012)
4. Bianchi, A., Shoshitaishvili, Y., Kruegel, C., Vigna, G.: Blacksheep: Detecting compromised hosts in homogeneous crowds. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS ’12, pp. 341–352. ACM, New York (2012)
5. BlackHat: Black hole. http://media.blackhat.com/bh-us-12/Briefings/Jones/BH_US_12_Jones_State_Web_Exploits_Slides.pdf , 2013