1. 2016. Transmission hijacked again to spread malware. https://blog.malwarebytes.com/threat-analysis/2016/09/transmission-hijacked-again-to-spread-malware/ 2016. Transmission hijacked again to spread malware. https://blog.malwarebytes.com/threat-analysis/2016/09/transmission-hijacked-again-to-spread-malware/
2. An Empirical Study of the Use of Integrity Verification Mechanisms for Web Subresources
3. Towards Usable Checksums
4. Common Crawl. 2019. Common Crawl. https://commoncrawl.org/ Common Crawl. 2019. Common Crawl. https://commoncrawl.org/
5. Sergej Dechand , Dominik Schürmann , Karoline Busse , Yasemin Acar , Sascha Fahl , and Matthew Smith . 2016 . An Empirical Study of Textual Key-Fingerprint Representations . In Proc. of the USENIX Security Symp. (USENIX Security). USENIX. Sergej Dechand, Dominik Schürmann, Karoline Busse, Yasemin Acar, Sascha Fahl, and Matthew Smith. 2016. An Empirical Study of Textual Key-Fingerprint Representations. In Proc. of the USENIX Security Symp. (USENIX Security). USENIX.