1. 45 CFR 46, http://www.hhs.gov/ohrp/humansubjects/guidance/45cfr46.htm
2. Estonia urges firm EU, NATO response to new form of warfare: cyber-attacks (May 2007), http://www.smh.com.au/news/Technology/Estonia-urges-firm-EU-NATO-response-to-new-form-of-warfarecyberattacks/2007/05/16/1178995207414.html
3. On-demand detection of malicious software. Technical Report No. 23, Anti-Virus Comparative (August 2009)
4. Lecture Notes in Computer Science;M. Bailey,2007
5. Chiang, K., Lloyd, L.: A case study of the rustock rootkit and spam bot. In: HotBots 2007: Proceedings of the First USENIX Workshop on Hot Topics in Understanding Botnets (2007)