1. Global Study of leaks of confidential information in the I half of 2015;Analytical Center InfoWatch,2015
2. Mikhaylov Dmitry, Zhukov Igor, Starikovskiy Andrey, Kharkov Sergey, Tolstaya Anastasia, Zuykov Alexander (2013) Review of Malicious Mobile Applications, Phone Bugs and other Cyber Threats to Mobile Devices. Proceedings of 2013 5th IEEE International Conference on Broadband Network & Multimedia Technology (5th IEEE IC-BNMT 2013), November 17-19th 2013 Guilin, China. Pages 302-305.
3. Dmitry Mikhaylov, Andrey Starikovskiy, Grigoriy Lebedev, Eugeniy Uleykin, Rubin Dmitry, Egorov Alexey, Boruchinkin Alexander, Tolstaya Anastasia. Developing a System for Text-Messages Protection. Proceedings of the 8th International Conference on Security of Information and Networks. September 8-10, 2015 Sochi/Russia. Pages: 326-329.
4. Erica Naone (2011) Researchers Hack Mobile Data Communications. MIT Technology Review, 2011. URL: http://www.technologyreview.com/news/424969/researchers-hack-mobile-data-communications.
5. Tools for hacking and interception of GSM signals, GSM interception and wiretapping cell. Spyservice, 2015. URL: http://spyservice.ru/blog/instrumenty-dlya-vzloma-i-perekhvata-gsm-signalov-gsm-perekhvat-i-proslushka-sotovykh.