B. Heater, Male: A Brief Timeline, 2011.

K. Hall, The 7 worstcyberattacks in history (that we know about) (2012), 2010.

R. P. Van-heerden, B. Irwin, and I. D. Burke, Classifying Network Attack Scenarios using an Ontology, Proceedings of the 7th International Conference on Information Warfare and Security, pp.331-324, 2012.

P. Desai, Towards an undetectable computer virus, Master's thesis, 2008.

S. R. Subramanya and N. Lakshminarasimhan, Computer viruses, IEEE Potentials, vol.20, issue.4, pp.16-19, 2001.
DOI : 10.1109/45.969588

P. Blümler, I-LOVE-YOU: Viruses, Trojan Horses and Worms

H. Orman, The Morris worm: A fifteen-year perspective, IEEE Security & Privacy Magazine, vol.1, issue.5, pp.35-43, 2003.
DOI : 10.1109/MSECP.2003.1236233

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.137.9685

T. M. Chen and J. M. Robert, Worm epidemics in high-speed networks, Computer, vol.37, issue.6, pp.48-53, 2004.
DOI : 10.1109/MC.2004.36

S. Cass, Anatomy of malice, IEEE, issue.11, pp.38-56, 2004.

S. Bosworth and M. E. Kabay, Computer security handbook, Analysis of the ILOVEYOU Worm, 2000.

D. Moore and C. Shannon, Code-Red, Proceedings of the second ACM SIGCOMM Workshop on Internet measurment , IMW '02, pp.273-284, 2002.
DOI : 10.1145/637201.637244

C. C. Zou, W. Gong, and D. Towsley, Code red worm propagation modeling and analysis, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, pp.138-147, 2002.
DOI : 10.1145/586110.586130

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.2.3262

U. Sarwar, S. Ramadass, and R. Budiarto, Dawn Of The Mobile Malware: Reviewing Mobile Worms, Proceedings of the 4 th International Conference on Sciences of Electronic, Technologies of Information and Telecommunications (SETIT2007), pp.35-39, 2007.

C. Czosseck, R. Ottis, and A. M. Taliharm, Estonia after the 2007 Cyber Attacks, International Journal of Cyber Warfare and Terrorism, vol.1, issue.1, pp.24-34, 2011.
DOI : 10.4018/ijcwt.2011010103

J. Davis, Hackers Take Down the Most Wired Country in Europe, Wired Magazine, 2007.

V. Sharma, An Analytical Survey of Recent Worm Attacks, IJCSNS, pp.99-103, 2011.

N. Falliere, L. O. Murchu, and E. Chien, W32.stuxnet dossier: version 1.4, White paper, Sy- mantec Corp, 2011.

F. Bradley, Critical infrastructure protection, Electric Energy T and D, vol.7, issue.2, pp.4-6, 2003.

S. Tsang, Cyberthreats, Vulnerabilities and Attacks on SCADA Networks, 2009.