1. S. M. Bellovin, A. Keromytis, and B. Cheswick, “Worm propagation strategies in an IPv6 Internet,” ;login:, pp. 70–76, February 2006.
2. Panda Security, “2nd international barometer of security in smbs,” Report, July 2010. [Online]. Available:
http://press.pandasecurity.com/wp-content/uploads/2010/08/2nd-International-Security-Barometer.pdf
3. W. J. Lynn, “Defending a new domain,” Foreign Affairs, vol. 5, no. 89, September/October 2010.
4. P. Dasgupta, C. K. S., and S. K. Gupta, “Vulnerabilities of PKI based smartcards,” in Proc. of IEEE Military Communications Conference (MILCOM), Orlando, FL, USA, October 2007.
5. McAfee, “Unified secure access solution for network access control,” Datasheet. [Online]. Available:
http://www.mcafee.com/us/local_content/datasheets/ds_nac.pdf