1. "What is Malware?" n.d. In Website Defender. Retrieved March 19, 2014, from http://www.websitedefender.com/what-is-malware/
2. "What is social computing?" (February 2010) Margaret Rouse. In Tech Target. Retrieved March 19, 2014, from
http://www.websitedefender.com/what-is-malware/
3. David Moore,Vern Paxson,Stefan Savage, Colleen Shannon,Stuart Staniford,Nicholas Weaver,CAIDA & UCSD CSE,ICIR & LBNL,UCSD CSE,CAIDA,Silicon Defense,Silicon Defense & UC Berkeley EECS. "The Spread of the Sapphire/Slammer Worm". March 20, 2014, from http://www.caida.org/publications/papers/2003/sapphire/sapphire.html
4. SQL Slammer. n.d. In Wikipedia. Retrieved March 20, 2014, from http://en.wikipedia.org/wiki/SQL_Slammer
5. 熊貓燒香. n.d. In Wikipedia. Retrieved March 20, 2014, from http://zh.wikipedia.org/wiki/%E7%86%8A%E7%8C%AB%E7%83%A7%E9%A6%99
6. 熊貓燒香. n.d. In Baike. Retrieved March 20, 2014, from http://www.baike.com/wiki/%E7%86%8A%E7%8C%AB%E7%83%A7%E9%A6%99.
7. Reports Sophos. (February 13, 2007) .Panda Joss-Stick Virus Is No Pandemic. Retrieved March 20, 2014, from http://english.cri.cn/4026/2007/02/13/202@195894.htm
8.Trojan horse. n.d. In Wikipedia. Retrieved March 18, 2014, from http://en.wikipedia.org/wiki/Trojan_horse_(computing)
9. malware signature. n.d. In Wikipedia. Retrieved October 8, 2012, from http://zh.wikipedia.org/wiki/%E7%89%B9%E5%BE%81%E7%A0%81
10. "How to help protect your computer from malware" n.d. In Microsoft. Retrieved March 20, 2014, from http://www.microsoft.com/security/resources/malware-whatis.aspx