1. Rupprecht, D., Kohls, K., Holz, T., Pöpper, C.: Breaking LTE on Layer Two https://alter-attack.net/media/breaking_lte_on_layer_two.pdf (2018) Aufgerufen am 27. Oct. 2022
2. Rupprecht, D., Kohls, K., Holz, T., Pöpper, C.: Call Me Maybe: Eavesdropping Encrypted LTE Calls With ReVoLTE https://revolte-attack.net/media/revolte_camera_ready.pdf (2020) Aufgerufen am 27. Oct. 2022
3. Beer, I., Groß, S.: A deep dive into an NSO zero-click iMessage exploit: Remote Code Execution https://googleprojectzero.blogspot.com/2021/12/a-deep-dive-into-nso-zero-click.html (2021) Aufgerufen am 27. Oct. 2022
4. Dunlap, T.: The 5 Worst Examples of IoT Hacking and Vulnerabilities in Recorded History. https://www.iotforall.com/5-worst-iot-hacking-vulnerabilities (2020). Aufgerufen am 30. Apr. 2022
5. Marvin, R.: The 5 Worst Hacks and Breaches of 2016 and What They Mean for 2017. https://uk.pcmag.com/business/87031/the-5-worst-hacks-and-breaches-of-2016-and-what-they-mean-for-2017 (2017). Aufgerufen am 30. Apr. 2022