1. Cybercriminals sell access to tens of thousands of malware-infected Russian hosts.
http://www.webroot.com/blog/2013/09/23/
. Last reviewed 10/03/2014
2. Getting started with the LLVM system using Microsoft Visual Studio.
http://llvm.org/docs/GettingStartedVS.html
. Last reviewed 10/03/2014
3. Malicious software and its underground economy.
https://www.coursera.org/course/malsoftware
. Last reviewed 10/03/2014
4. Windows registry persistence, part 2: the run keys and search-order.
http://blog.cylance.com
. Last reviewed 10/03/2014
5. Andoni, A., Indyk, P.: Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions. Commun. ACM 51(1) (2008)