1. “Computer Viruses - Theory and Experiments”;Cohen;originally appearing in IFIP-SEC 84 and also appearing as invited paper in Computers and Security,1984
2. MessageLabs. 2004. Email security intelligence report: January–June 2004. http://www.messagelabs.com/emailthreats/intelligence/whitepapers/pdf/sixreport.pdf
3. “W32.Bobax.D”, Symantec Security Response, 19 May 2004. http://securityresponse.symantec.com/avcenter/venc/data/pf/w32.bobax.d.html.
4. “W32.Beagle.AB@mm”, Symantec Security Response, 15 July 2004. http://securityresponse.symantec.com/avcenter/venc/data/pf/w32.beagle.ab@mm.html.
5. “W32.Mydoom.M@mm”, Symantec Security Response, 26 July 2004. http://securityresponse.symantec.com/avcenter/venc/data/pf/w32.mydoom.m@mm.html.