1. Calin, B. (2009), “Statistics from 10,000 Leaked Hotmail Passwords”, Acunetix: Web Application Security, available at: www.acunetix.com/blog/news/statistics‐from‐10000‐leaked‐hotmail‐passwords/.
2. Homeland Security (2009), Recommended Practice: Improving Industrial Control Systems Cybersecurity with Defense‐in‐depth Strategies, available at: www.us‐cert.gov/control_systems/practices/documents/Defense_in_Depth_Oct09.pdf.
3. The domino effect of password reuse
4. Lewand, R.E. (2008), “Relative frequencies of letters in general English plain text”, Cryptographical Mathematics, available at: http://pages.central.edu/emp/LintonT/classes/spring01/cryptography/letterfreq.html.
5. Mhassanmemon (2011), “Password statistics”, Security, available at: http://computersight.com/communication‐networks/security/password‐statistics/.