1. Rapporto Clusit 2015;Clusit,2015
2. PandaLab, Panda security mediacenter, URL http://www.pandasecurity.com/mediacenter/press-releases/all-recorded-malware-appeared-in-2015/.
3. 2015 Cost of Cyber Crime Study;LLC,2015
4. Intelligent agents: Theory and practice;Wooldridge;Knowl. Eng. Rev.,1995
5. Computer Science Curricula 2013;ACM/IEEE-CS Joint Task Force on Computing Curricula,2013