1. L. Kharouni etal "Operation Pawn Storm Using Decoys to Evade Detection " Trendmicro 2014. {Online}. Available: http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-operation-pawn-storm.pdf L. Kharouni et al. "Operation Pawn Storm Using Decoys to Evade Detection " Trendmicro 2014. {Online}. Available: http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-operation-pawn-storm.pdf
2. P. Paganini "The differences between targeted attacks and advanced persistent threats " 2015. {Online}. Available: http://securityaffairs.co/wordpress/40228/cyber-crime/targeted-attacks-vs-advanced-persistent-threats.html. P. Paganini "The differences between targeted attacks and advanced persistent threats " 2015. {Online}. Available: http://securityaffairs.co/wordpress/40228/cyber-crime/targeted-attacks-vs-advanced-persistent-threats.html.
3. lvxferis "Hacking the mind for fun and profit " in phrack.org 2010. {Online}. Available: http://phrack.org/issues/67/15.html. Accessed: Mar. 6 2017. lvxferis "Hacking the mind for fun and profit " in phrack.org 2010. {Online}. Available: http://phrack.org/issues/67/15.html. Accessed: Mar. 6 2017.