1. Moser, A., et al.: Exploring multiple execution paths for malware analysis. In: 2007 IEEE Symposium on Security and Privacy (SP 2007), May 2007
2. Symantec Security Response, IoT devices being increasingly used for DDoS attacks (2016). https://www.symantec.com/connect/blogs/iot-devices-being-increasingly-used-ddos-attacks . Accessed 28 Mar 2017
3. Snell, B.: Mobile threat report: whats on the horizon for 2016 (2016). https://www.mcafee.com/us/resources/reports/rp-mobile-threat-report-2016.pdf . Accessed 28 Mar 2017
4. Biswas, A.: Scary insights into the security of smart things: what the IoT startups dont pitch about (2016). http://electronicsofthings.com/expert-opinion/scary-insights-security-smart-things-what-the-iot-startups-dont-pitch-about/5/ . Accessed 28 Mar 2017
5. Greenemeier, L.: IoT growing faster than the ability to defend it (2016). https://www.scientificamerican.com/article/iot-growing-faster-than-the-ability-to-defend-it/ . Accessed 28 Mar 2017