1. Anderson, B., Anderson, B.: Seven Deadliest USB Attacks. Syngress, Maryland Heights (2010)
2. Angel, S., Wahby, R.S., Howald, M., Leners, J.B., Spilo, M., Sun, Z., Blumberg, A.J., Walfish, M.: Defending against malicious peripherals with Cinch. In: USENIX Security Symposium (2016)
3. Dingledine, R., Mathewson, N.: Anonymity loves company: usability and the network effect. In: Workshop on the Economics of Information Security (WEIS) (2006)
4. Fidas, C., Voyiatzis, A., Avouris, N.: When security meets usability: a user-centric approach on a crossroads priority problem. In: 14th Panhellenic Conference on Informatics (PCI 2010), Tripoli, Greece, 10–12 September 2010 (2010)
5. Griscioli, F., Pizzonia, M., Sacchetti, M.: USBCheckIn: preventing BadUSB attacks by forcing human-device interaction. In: 2016 14th Annual Conference on Privacy, Security and Trust (PST), pp. 493–496. IEEE (2016)