1. Advanced Persistent threats and how to monitor and deter them
2. U.Rivner Anatomy of an attack 2011.http://blogs.rsa.com/AN.
3. K.Zetter Google hack attack was ultra sophisticated new details show 2010.http://www.wired.com/.
4. G.Smith White House hacked in cyber attack that used spear‐phishing to crack unclassified network 2012 http://www.huffingtonpost.com/.
5. E. M.Hutchins M. J.Cloppert andR. M.Amin Intelligence‐driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains In 6th Annual conference on Information Warfare and Security Washington 2011.