[1] John Brunner , Shockwave Rider, Reissued May 1990, Ballantine Books.
[2] Katie Hafner and John Markoff , Cyberpunk: Outlaws and Hackers on the Computer Frontier, June 1995, Simon and Schuster.
[3] Shuchi Nagpal , “Computer Worms, An Introduction,” Asian School of Cyber Laws, 2002, www.asianlaws.org/cyberlaw/library/cc/what_worm.htm.
[4] J. Shoch and J. Hupp , “The 'Worm' Programs—Early Experience with a Distributed Computation,” Communications of the ACM, Vol. 25, No. 3, March 1982, pp. 172–180.
[5] “Benefits of a Computer Virus,” www.greyowltutor.com/essays/virus.html.
[6] Fuller, V., Li, T. , et al., “CIDR Address Strategy,” RFC 1519, www.ietf.org/rfc/rfc1519.txt?number=1519.
[7] CERT Coordination Center, “CERT Advisory CA-2001-26 Nimda ...