1. C. Grier, L. Ballard, J. Caballero, N. Chachra, C. Dietrich, K. Levchenko, P. Mavrommatis, D. McCoy, A. Nappa, A. Pitsillidis, N. Provos, M. Rafique, M. Rajab, C. Rossow, K. Thomas, V. Paxson, S. Savage, G. Voelker, Manufacturing compromise: the emergence of exploit-as-a-service, in: Proceedings of the Nineteenth ACM Conference on Computer and Communications Security, 2012, pp. 821–832.
2. J. Caballero, C. Grier, C. Kreibich, V. Paxson, Measuring pay-per-install: the commoditization of malware distribution, in: Proceedings of the Twentieth USENIX Conference on Security, 2011.
3. M. Cova, C. Kruegel, G. Vigna, Detection and analysis of drive-by-download attacks and malicious Javascript code, in: Proceedings of the Nineteenth International Conference on the World Wide Web, 2010, pp. 281–290.
4. N. Provos, P. Mavrommatis, M. Rajab, F. Monrose, All your iFRAMEs point to us, in: Proceedings of the Seventeenth USENIX Conference on Security, 2008.
5. K. Stevens, The underground economy of the pay-per-install (PPI) business, presented at the BlackHat DC Security Conference 〈www.blackhat.com/presentations/bh-dc-10/Stevens_Kevin/BlackHat-DC-2010-Stevens-Underground-wp.pdf〉, 2010.