1. Malware Evolution Research at UW-Madison. http://www.cs.wisc.edu/~archit/projects/malware/. Malware Evolution Research at UW-Madison. http://www.cs.wisc.edu/~archit/projects/malware/.
2. Dissecting Android Malware: Characterization and Evolution
3. Omer K. Jasim1 Safia Abbas Abdel-Badeeh M. Salem. Evolution of an Emerging Symmetric Quantum Cryptographic Algorithm. JIS PP. 82--91. Omer K. Jasim1 Safia Abbas Abdel-Badeeh M. Salem. Evolution of an Emerging Symmetric Quantum Cryptographic Algorithm. JIS PP. 82--91.
4. James P. Anderson Computer Security Technology Planning Study Volume I ESD-TR-73-51 Vol. I Electronic Systems Division Air Force Systems Command Hanscom Field Bedford MA 01730 (Oct. 1972). James P. Anderson Computer Security Technology Planning Study Volume I ESD-TR-73-51 Vol. I Electronic Systems Division Air Force Systems Command Hanscom Field Bedford MA 01730 (Oct. 1972).
5. David E. Bell and Leonard J. La Padula "Secure Computer Systems: Mathematical Foundations " ESD-TR-73-278 Vol. I Electronic Systems Division Air Force Systems Command Hanscom AFB Bedford MA 01731 (Nov. 1973). David E. Bell and Leonard J. La Padula "Secure Computer Systems: Mathematical Foundations " ESD-TR-73-278 Vol. I Electronic Systems Division Air Force Systems Command Hanscom AFB Bedford MA 01731 (Nov. 1973).