1. Anderson R.M., May R.M. (1991). Infectious diseases of humans: dynamics and control. Oxford University Press, Oxford
2. Blaster (2003) eEye Digital Security, Blaster worm analysis. http://www.eeye.com/html/Research/Advisories/AL20030811.html
3. Costa, M., Crowcroft, J., Castro, M., Rowstron, A., Zhou, L., Zhang, L., Barham, P.: Vigilante: End-to-End Containment of Internet Works. In: 20th ACM symposium on Operating systems principles, pp. 133–147 (2005)
4. Gu, G., Sharif, M., Qin, X., Dagon, D., Lee, W., Riley, G.: Worm detection, early warning and response based on local victim information. In: 20th Annual Computer Security Applications Conference, pp. 136–145 (2004)
5. Heathcote The mathematics of infectious diseases. SIAM Rev. 42(4), 599–653 (2000)