M. E. Hutchins, J. M. Cloppert, and R. M. Amin ′′Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains,′′ Leading Issues in Information Warfare & Security Research, Vol. 1, pp. 80-106, 2011.
S. Caltagirone, P. Andrew, and B. Christopher, ′′The Diamond Model of Intrusion Analysis,′′ Center for Cyber Threat Intelligence and Threat Research, Hanover, MD. 2013
K. Savage, ′′W32.Phopifas Cons Over 2.5 Million Clicks with LOL Links,′′ [Online]. Available: http://www.symantec.com/connect/blogs/w32phopifas-cons-over-25-million-clicks-lol-links, 2012, Oct.10.
R. Calvo, ′′Downloader.Liftoh Cousin to W32.Phopifas?,′′ [Online]. Available: https://www.symantec.com/connect/blogs/downloaderliftoh-cousin-w32phopifas, 2013, May 23.