1. Lehtinen, R., Gangemi, G.T.: Computer Security Basics: Computer Security. O’Reilly Media (2006)
2. Sharma, A., Sahay, S.K.: Evolution and detection of polymorphic and metamorphic malwares: a survey. Int. J. Comput. Appl. 90(2), 7–11 (2014)
3. Stone, R.: A call to cyber arms. Science 339(6123), 1026–1027 (2013)
4. Aimoto, S., AlKhatib, T., Coogan, P., Corpin, M., DiMaggio, J.: Internet security threat report. Technical report, Symantec (2014)
5. Daly, M.K.: Advanced persistent threat. Usenix, Nov, 4, 2009