1. Clough, J.: Principles of Cybercrime. Cambridge University Press, Cambridge (2015)
2. Passeri, P.: Cyber Attacks StatisticsPaolo Passeri, May 2016. http://www.hackmageddon.com/category/security/cyber-attacks-statistics/ . Accessed 07 October 2016
3. Aviram, N., et al.: DROWN: Breaking TLS using SSLv2 (2016). https://www.lemarson.com/public/upload/ressource/filename/DROWN_SSL.pdf . Accessed 08 November 2016
4. Al Fardan, N.J., Paterson, K.G.: Lucky thirteen: breaking the TLS and DTLS record protocols. In: 2013 IEEE Symposium on Security and Privacy (SP). IEEE (2013)
5. Bhargavan, K., Leurent, G.: Transcript collision attacks: breaking authentication in TLS, IKE, and SSH. In: NDSS, February 2016