1. Alzubaidy, L. and Hatim, K. (2015) ‘Analysis and detection of the Zeus Botnet crimeware’, International Journal of Computer Science and Information Security, 13, pp. 121–135.
2. Anomali (2019) APT28 timeline of malicious activity. Available at: https://forum.anomali.com/t/apt28-timeline-of-malicious activity/2019 (Accessed: 21 February 2019).
3. Antonakakis, M., April, T., Bailey, M., Bernhard, M., Bursztein, E., Cochran, J., Durumeric, Z., Halderman, J.A., Invernizzi, L., Kallitsis, M., Kumar, D., Lever, C., Ma, Z., Mason, J., Menscher, D., Seaman, C., Sullivan, N., Thomas, K. and Zhou, Y. (2017). 'Understanding the mirai botnet', in Proceedings of the 26th USENIX Security Symposium. Vancouver: USENIX Association, pp. 1093-1110.
4. Ashford, W. (2018) Next-gen Mirai botnet targets cryptocurrency mining operations, Computer Weekly.com. Available at: https://www.computerweekly.com/news/450433414/Next-gen-Mirai-botnet-targets-cryptocurrencymining-operations (Accessed: 21 April 2020).
5. Spyware and Adware