1. E. H. Spafford, “The Internet Worm Program: An Analysis,” Purdue Technical Report CSD-TR-823, West Lafayette, 1988.
2. C. Czosseck, “State Actors and their Proxies in Cyberspace,” in Peacetime Regime for State Activities in Cyberspace, K. Ziolkowski, Ed., NATO CCD COE Publications, 2013, pp. 1–24.
3. A. Hilts, C. Parsons and J. Knockel, “Every Step You Fake: A Comparative Analysis of Fitness Tracker Privacy and Security,” 2016. [Online]. Available: https://openeffect.ca/reports/Every_Step_You_Fake.pdf. [Accessed 24 February 2017].
4. J. Radcliffe, “Hacking Medical Devices for Fun and Insulin: Breaking the Human SCADA System,” in Black Hat 2011, Las Vegas, USA, 2011.
5. D. C. Klonoff, “Cybersecurity for Connected Diabetes Devices,” Journal of Diabetes Science & Technology, September 2015.