Acknowledgement
The research leading to the publication of this article is funded by a research grant from Universiti Kebangsaan Malaysia (DPK-2019-002).
References
- Virgil and Mandelbaum, A. (translator), The Aenied of Virgil. 35th ed. Berkeley, University of California Press, 2007.
- Trusted Integrated Circuits (TRUST). Defense Advanced Research Projects Agency, 2008, http://www.darpa.mil.
- Stokes, J. Pentagon Fears Trojans, Kill Switches In Foreign-Made CPUs. ArsTechnica. http://arstechnica.com [2 May 2008]
- Navarro, P. and Autry, G. Death by China: Confronting the Dragon - A Global Call to Action. Upper Saddle River, Prentice Hall, 2011.
- Freedman, A. Computer Desktop Encyclopedia. eBook edition. Osborne/McGraw-Hill, 2014.
- Malware Defense Guide, 2011. http://technet.microsoft.com.
- Dunham, K. (ed). Mobile Malware Attacks and Defense. Burlington, Syngress Publishing, 2009.
- The Symbian Foundation Community http://www.symbian.org.
- Threat Encyclopedia. Trend Micro, 2021. https://www.trendmicro.com/vinfo/us/threat-encyclopedia
- Boase, J., Wellman, B. A Plague of Viruses: Biological, Computer and Marketing. Current Sociology, 49(6), 39, 2001. https://doi.org/10.1177/0011392101496006
- Smith, R. Phlashdance: Discovering Permanent Denial of Service Attacks against Embedded Systems. Presentation Slides. EUSecWest, 2008. http://eusecwest.com.
- Trojans Suspected of Contributing to 2008 Madrid Aircrash. Infosecurity, 8, 2010. http://www.infosecurity-magazine.com.
- Kizza, J. M. A guide to Computer Network Security. Chattanooga, Springer, 2009.
- Kleissner, P. Stoned Bootkit. 2010. http://www.stonedvienna.com.
- Malware Evolution in 2007. Kaspersky Security Bulletin, 2007. http://www.kaspersky.com.
- Avira. http://www.avira.com [December 2010].
- Mobile Security Report. Avira, https://www.avira.com/en/mobile-security-report [November 2020].
- (1986) 83 Cr App R 54.
- (1991) 93 Cr App R 25.
- Wasik, M. Criminal Damage and the Computerised Law. New Law Journal, 136(6266), 763, 1986.
- Chao, L, Wei, J. and Xin, Z. Botnet: Survey and Case Study. IEEE Computer Society, 1184, 2009.
- Gao, Q., Hu, Y., Li, L., Chen, X. and Liu, H. A Novel Computer Architecture to Prevent Destruction by Viruses. J. Comput. Sci. & Technol, 17(3), 241, 2002. https://doi.org/10.1007/BF02947303
- Baskin, B. et al. Combating Spyware in the Enterprise. Rockland, Syngress Publishing, 2006.
- "W95/CIH-10xx" Sophos http://www.sophos.com.
- Lemos, R. Virulent Worm Calls into Doubt Our Ability to Protect the Net. CNET News, 2001. http://news.cnet.com.
- Zou, C. C., Towsley, D., Gong, W. & Cai, S. Advanced Routing Worm and Its Security Challenges. SIMULATION, 82(1), 75, 2006. https://doi.org/10.1177/0037549706065344
- Wei, Y., Nan, Z., Xinwen, F. & Wei, Z. Self-Disciplinary Worms and Countermeasures: Modeling and Analysis. IEEE Transactions on Parallel and Distributed Systems, 21(10), 1501, 2010. https://doi.org/10.1109/TPDS.2009.161
- Nissenbaum, H. Where Computer Security Meets National Security in Balkin, J. M., Grimmmelmann, J., Katz, E., Kozlovski, N., Wagman, S., and Zarsky, T. (eds). Cybercrime: Digital Cops In A Networked Environment. New York, New York University Press, 2007.
- Gissel, R. The Development and Evaluation of a Computer Crime Investigative Distance-learning Program for the National Cybercrime Training Partnership. New York, MacroTech Press, 2005.