1. Bajikar, S. (2002). Trusted Platform Module (TPM) based security on notebook PCs. White Paper, Mobile Platforms Group, Intel Corporation.
2. Brewer, R. (2014). Advanced persistent threats: minimizing the damage. Network Security, 4, 5–9.
3. Cohen, F., Lambert, D., Preston, C., Berry, N., Stewart, C., & Thomas, E. (2001). A framework for deception. Computers and Security (IFIP-TC11), pp. 3–40.
4. Ellison, R. J., Fisher, D. A., Linger, R. C., Lipson, H. F., Longstaff, T. A., & Mead, N. R. (1999). Survivability: protecting your critical systems. IEEE Internet Computing, 3, 55–63.
5. Gragido, W., & Pirc, J. (2011). Cyber Crime and Espionage: Seven Commonalities of Subversive Multi-vector Threats. Elsevier.