JavaScript’, The Register, 23 March 2016; Tung L., ‘A row that
led a developer to delete a 17-line JavaScript module has
stopped countless applications working’, ZDNet, 23 March 2016;
Roberts M., ‘A discussion about the breaking of the Internet’,
Medium, 23 March 2016.
- Haney D., ‘NPM & left-pad: Have We Forgotten How To
Program?’ 23 March 2016, https://www.davidhaney.io
- Rotabi R. et al., ‘Tracing the Use of Practices through Networks
of Collaboration’, AAAI, 2017.
- Fox-Brewster T., ‘Hackers Sell $7,500 IoT Cannon To Bring
Down The Web Again’, Forbes, 23 October 2016.
- Gallagher S., ‘New variants of Mirai botnet detected, targeting
more IoT devices’, Ars Technica, 9 April 2019.
- Cohen F., ‘Computer Viruses – Theory and Experiments’, 1984.
- Cloonan J., ‘Advanced Malware Detection – Signatures
vs. Behavior Analysis’, Infosecurity Magazine, 11 April 2017.
- Oldstone M.B.A., Viruses, Plagues, and History (Oxford
University Press, 2010).
- Background on Beebone from: Goodin D., ‘US, European police
take down highly elusive botnet known as Beebone’, Ars
Technica, 9 April 2015; Samani R., ‘Update on the Beebone
Botnet Takedown’, McAfee Blogs, 20 April 2015.
- Thompson C.P. et al., ‘A naturally protective epitope of limited
variability as an influenza vaccine target’, Nature
Communications, 2018.
- ‘McAfee Labs 2019 Threats Predictions Report’, McAfee Labs,
29 November 2018; Seymour J. and Tully P., ‘Weaponizing data
science for social engineering: Automated E2E spear phishing on
Twitter’, Working paper, 2016.
7. Tracking outbreaks