1. Herrera-Flanigan, J.R., Ghosh, S.: Criminal Regulations. In: Ghosh, S., Turrini, E. (eds.) Cybercrimes: A Multidisciplinary Analysis, pp. 265–308. Springer, Heidelberg (2010)
2. Alazab, M., Venkataraman, S., Watters, P.: Effective digital forensic analysis of the NTFS disk image. Ubiquitous Computing and Communication Journal 4, 551–558 (2009)
3. RSA: The Current State of Cybercrime and What to Expect in 2011. RSA 2011 cybercrime trends report (2011)
4. Venkatraman, S.: Autonomic Context-Dependent Architecture for Malware Detection. In: Proceedings of International Conference on e-Technology, International Business Academics Consortium, Singapore, pp. 2927–2947 (2009)
5. Alperovitch, D., Dirro, T., Greve, P., Kashyap, R., Marcus, D., Masiello, S., Paget, F., Schmugar, C.: McAfee Labs - 2011 Threats Predictions. McAfee, Inc. (2011)