1. Advanced intrusion detection environment. http://sourceforge.net/projects/aide.
2. Alleged botnet crimes trigger arrests on two continents. http://abcnews.go.com/Technology/PCWorld/story?id=1314632.
3. AMD Pacifica virtualization technology. http://enterprise.amd.com/Downloads/Pacifica_en.pdf.
4. Beck Doug, Vo Binh, Verbowski Chad. Detecting stealth software with Strider Ghostbuster. In: Proceedings of the 2005 international conference on dependable systems and networks (DSN'05); 2005. p. 368–77.
5. Bind TSIG vulnerability. http://www.sans.org/resources/idfaq/tsig.php.