1. Multi-level Windows exploitation using Linux Operating System;AbdulKhaleq Abdulrahman Aysar;Asian Journal of Natural Applied Sciences,2016
2. US-CERT Alert. 2018. (TA18-106A) Russian State-Sponsored Cyber Actors Targeting Network Infrastructure Devices. US-CERT.gov (April 2018). https://www.us-cert.gov/ncas/alerts/TA18-106A US-CERT Alert. 2018. (TA18-106A) Russian State-Sponsored Cyber Actors Targeting Network Infrastructure Devices. US-CERT.gov (April 2018). https://www.us-cert.gov/ncas/alerts/TA18-106A
3. Romain Bezut and Vivien Bernet-Rollande. 2010. Experimental study: Study of dictionary attacks on SSH. University of Technology of Compiegne (2010). https://files.xdec.net/TX_EN_Bezut_Bernet-Rollande_BruteForce_SSH.pdf Romain Bezut and Vivien Bernet-Rollande. 2010. Experimental study: Study of dictionary attacks on SSH. University of Technology of Compiegne (2010). https://files.xdec.net/TX_EN_Bezut_Bernet-Rollande_BruteForce_SSH.pdf
4. Catalin Cimpanu. 2018. Cyber-Attacks On US Critical Infrastructure Linked To Cisco Switch Flaw. BleepingComputer.com (2018). www.bleepingcomputer.com/news/security/cyber-attacks-on-us-critical-infrastructure-linked-to-cisco-switch-flaw Catalin Cimpanu. 2018. Cyber-Attacks On US Critical Infrastructure Linked To Cisco Switch Flaw. BleepingComputer.com (2018). www.bleepingcomputer.com/news/security/cyber-attacks-on-us-critical-infrastructure-linked-to-cisco-switch-flaw