DDoS Attack’, Kaspersky Lab, 23 March 2017.
Palmer D., ‘Ransomware is now big business on the dark web and malware developers are cashing in’, ZDNet, 11 October 2017.
Nakashima E. and Timberg C., ‘NSA officials worried about the day its potent hacking tool would get loose. Then it did’, Washington Post, 16 May 2017.
Orr A., ‘Zerodium Offers $2 Million for Remote iOS Exploits’, Mac Observer, 10 January 2019.
Kushner D., ‘The Real Story of Stuxnet’, IEEE Spectrum, 26 February 2013; Kopfstein J., ‘Stuxnet virus was planted by Israeli agents using USB sticks, according to new report’, The Verge, 12 April 2012.
Kaplan F., Dark Territory: The Secret History of Cyber War (Simon & Schuster, 2016).
Dark Trace. Global Threat Report 2017. http://www.darktrace.com.
Lomas A., ‘Screwdriving. Locating and exploiting smart adult toys’, Pen Test Partners Blog, 29 September 2017; Franceschi-Bicchierai L., ‘Hackers Can Easily Hijack This Dildo Camera and Livestream the Inside of Your Vagina (Or Butt)’, Motherboard, 3 April 2017.
DeMarinis N. et al., ‘Scanning the Internet for ROS: A View of Security in Robotics Research’, arXiv, 2018.
Об отключении серверов AWS: Hindi R., ‘Thanks for breaking our connected homes, Amazon’, Medium, 28 February, 2017; Hern A., ‘How did an Amazon glitch leave people literally in the dark?’, The Guardian, 1 March 2017.
Amazon Compute Service Level Agreement, https://aws.amazon.com, 12 February 2018; Poletti T., ‘The engine for Amazon earnings growth has nothing to do with e-commerce’, Market Watch, 29 April 2018.
Swift D., ‘“Mega Outage” Wreaks Havoc on Internet, is AWS too Big to Fail?’, Digit, 2017; Bobeldijk Y., ‘Is Amazon’s cloud service too big to fail?’, Financial News, 1 August 2017.
Barrett B. and Newman L.H., ‘The Facebook Security Meltdown Exposes Way More Sites Than Facebook’, Wired, 28 September 2018.
О «любовном вирусе»: Meek J., ‘Love bug virus creates worldwide chaos’, The Guardian, 5 May 2000; Barabási A.L., Linked: the New Science of Networks (Perseus Books, 2003).
White S.R., ‘Open Problems in Computer Virus Research’, Virus Bulletin Conference, 1998.
Barabási A.L. and Albert R., ‘Emergence of Scaling in Random Networks’, Science, 1999.
Pastor-Satorras R. and Vespignani A., ‘Epidemic Spreading in ScaleFree Networks’, Physical Review Letters, 2 April 2001.
Goel S. et al., ‘The Structural Virality of Online Diffusion’, Management Science, 2016.
О программном модуле left-pad: Williams C., ‘How one developer just broke Node, Babel and thousands of projects in 11 lines of JavaScript’, The Register, 23 March 2016; Tung L., ‘A row that led a developer to delete a 17-line JavaScript module has stopped countless applications working’, ZDNet, 23 March 2016; Roberts M., ‘A discussion about the breaking of the Internet’, Medium, 23 March 2016.
Haney D., ‘NPM & left-pad: Have We Forgotten How To Program?’, 23 March 2016, https://www.davidhaney.io.
Rotabi R. et al., ‘Tracing the Use of Practices through Networks of Collaboration’, AAAI, 2017.
Fox-Brewster T., ‘Hackers Sell $7,500 IoT Cannon To Bring Down The Web Again’, Forbes, 23 October 2016.
Gallagher S., ‘New variants of Mirai botnet detected, targeting more IoT devices’, Ars Technica, 9 April 2019.
Cohen F., ‘Computer Viruses – Theory and Experiments’, 1984.
Cloonan J., ‘Advanced Malware Detection – Signatures vs. Behavior Analysis’, Infosecurity Magazine, 11 April 2017.
Oldstone M.B.A., Viruses, Plagues, and History (Oxford University Press, 2010).
Goodin D., ‘US, European police take down highly elusive botnet known as Beebone’, Ars Technica, 9 April 2015; Samani R., ‘Update on the Beebone Botnet Takedown’, McAfee Blogs, 20 April 2015.
Thompson C.P. et al., ‘A naturally protective epitope of limited variability as an influenza vaccine target’, Nature Communications, 2018.
‘McAfee Labs 2019 Threats Predictions Report’, McAfee Labs, 29 November 2018; Seymour J. and Tully P., ‘Weaponizing data science for social engineering: Automated E2E spear phishing on Twitter’, Working paper, 2016.
Дело Шмидта: Court of Appeal of Louisiana, Third Circuit. STATE of Louisiana v. Richard J. SCHMIDT. No. 99–1412, 2000; Miller M., ‘A Deadly Attraction’, Newsweek, 18 August 1996.
Darwin C., Journal of researches into the natural history and geology of the countries visited during the voyage of H.M.S. Beagle round the world, under the command of Capt. Fitz Roy, R.N. (John Murray, 1860).
Другая аналогия – игра «дублеты», придуманная Льюисом Кэрроллом. В ней путем постепенной замены букв можно получить из одного слова другое, например: КОЗА – ПОЗА – ПОЛА – ПОЛК – ВОЛК. – Прим. ред.
Hon C.C. et al., ‘Evidence of the Recombinant Origin of a Bat Severe Acute Respiratory Syndrome (SARS)-Like Coronavirus and Its Implications on the Direct Ancestor of SARS Coronavirus’, Journal of Virology, 2008.
Forensic File Update on Janice Trahan Case, CNN, 14 March 2016.
González-Candelas F. et al., ‘Molecular evolution