1. Computer Viruses;Cohen;Proceedings of the 7th DOD/NBS Computer Security Conference,1984
2. Boebert, W.E., and Ferguson, C.T.: A Partial Solution to the Discretionary Trojan Horse Problem, Honeywell Secure Technology Center, Minneapolis, MN.
3. Out of the Inner Circle: A Hacker's Guide to Computer Security;Landreth,1985
4. Computer Security Technology Planning Study;Anderson,1972
5. Cryptography and Data Security;Denning,1982