1. Baksi, R. P., & Upadhyaya, S. J. (2017). Kidemonas: The silent guardian. arXiv:1712.00841.
2. Baksi, R. P., & Upadhyaya, S. J. (2018). A comprehensive model for elucidating advanced persistent threats (apt). In Proceedings of the International Conference on Security and Management (SAM) (pp. 245–251): The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp).
3. Bencsáth, B., Pék, G., Buttyán, L., & Felegyhazi, M. (2012). The cousins of stuxnet: duqu, flame, and gauss. Future Internet, 4(4), 971–1003.
4. Bennett, J. T., Moran, N., & Villeneuve, N. (2013). Poison ivy: Assessing damage and extracting intelligence. FireEye Threat Research Blog.
5. Bishop, M., & Gates, C. (2008). Defining the insider threat. In Proceedings of the 4th annual workshop on Cyber security and information intelligence research: developing strategies to meet the cyber security and information intelligence challenges ahead (pp. 1–3).