1. Manmeet Mahinderjit Singh et al. (2014), “Security Attacks Taxonomy on Bring Your Own Devices (BYOD) Model”, International Journal of Mobile, Network, Communication and Telematics (IJMNCT), ISSN : 1839-5678.
2. A. Pillay, H. Diaki, E. Nham, S. Senanayake, G. Tan, S. Deshpande, Does BYOD Increase Risks or Drive Benefits?, Melbourne, The University of Melbourne.
3. Frankie Li, A Detailed Analysis of an Advanced Persistent Threat Malware, the SANS Institute, October 2011, [online] :http://www.sans.org/reading-room/whitepapers/malicious/detailed-analysis-advanced-persistent-threat-malware-33814.
4. Websense, “Advanced Persistent Threats And Other Advanced Attacks White Paper”, 2011.
5. N. Leavitt (2013),“Todays Mobile Security Requires a New Approach”, IEEE Computer Society Press Los Alamitos, CA, USA, Volume 46 Issue 11, November 2013, pp 16-19, doi:10.1109/MC.;1; 2013.400.