1. Allen J. Stoner E . (2000), Detecting Signs of Intrusions. Software Engineering Institute.
2. Alston J. D . (1994), ‘The Serial Rapist’s Spatial Pattern of Target Selection’, doctoral dissertation, School of Criminology/Simon Fraser University.
3. Ball D . (2011), ‘China’s Cyber Warfare Capabilities’, Security Challenges, 7: 81–103.
4. An evaluation of connection characteristics for separating network attacks
5. Bossler A. M. Holt T. J . (2009), ‘On-Line Activities, Guardianship, and Malware Infection: An Examination of Routine Activities Theory’, International Journal of Cyber Criminology, 3: 400–20.