1. Alperovitch, D.: Revealed: Operation Shady RAT (2011)
2. Bejtlich, R.: What Is APT and What Does It Want (2010),
http://taosecurity.blogspot.be/2010/01/what-is-apt-and-what-does-it-want.html
3. Bennett, J.T., et al.: Poison Ivy: Assessing Damage and Extracting Intelligence (2013)
4. Giura, P., Wang, W.: Using large scale distributed computing to unveil advanced persistent threats. SCIENCE 1(3) (2013)
5. Gragido, W.: Lions at the Watering Hole – The “VOHO” Affair (2012),
http://blogs.rsa.com/lions-at-the-watering-hole-the-voho-affair/