AdamA.YoungAdamA., MotiM.YungMotiM., Cryptovirology: extortion-based security threats and countermeasures, [w:] IEEE Symposium on Security and Privacy, 1996, s. 129–140, DOI: 10.1109/SECPRI.1996.502676, ISBN 0-8186-7417-2(ang.).???
AdamA.YoungAdamA., Cryptoviral Extortion Using Microsoft's Crypto API: Can Crypto APIs Help the Enemy?, „International Journal of Information Security”, 5 (2), Springer-Verlag, 2006, s. 67–76, DOI: 10.1007/s10207-006-0082-7(ang.).