| Ссылка | Дата | Объем в кбайтах | Число страниц | Справка | 
| After Stuxnet: The new rules of cyberwar/ Critical infrastructure providers face a rising tide of increasingly sophisticated and potentially destructive attacks.
By Robert L. Mitchell. | 2012 | 33 | 6 | Целевая сетевая атака, один из видов кибероружия | 
| Anatomy Of A Targeted, Persistent Attack. | Jan 27, 2010 | 1136 | 4 | By Kelly Jackson Higgins | 
| Advanced Persistent Threats and other advances attacks. Threat analyses and defence stratagy. (Websense) | 2011 | 2239 | 13 |  | 
| Best Practices for Mitigating Advanced Persistent Threats. | 18 January 2012 | 356 | 20 |  | 
| Defending Against Advanced Persistent Threats. | February 2010 | 581 | 6 |  | 
| Cybersecurity: Defending Against Advanced Persistent Threats. | February 2011 | 252 | 4 |  | 
| The Advanced Persistent Threat Attack Model. | 2012 | 1201 | 12 |  | 
| Advanced persistent threat. From Wikipedia. | 2012 | 254 | 3 |  | 
| Best Practices for Mitigating Advanced Persistent Threats Lawrence Pingree, Neil MacDonald | January 2012 | 356 | 20 |  | 
| Defeating Advanced Persistent Threat Malware | 2013 | 1305 | 16 |  | 
| New evidence shows Stuxnet used since at least 2007 | February 26, 2013 | 1096 | 3 | By Lucian Constantin | 
| How to seek and destroy advanced persistent threats | Nov 17, 2016 | 362 | 4 | Jian Zhen, InfoWorld | 
| Red alert! Beware of insiders bearing APTs | Feb 28, 2017 | 212 | 2 | InfoWorld, Roger A. Grimes | 
| Double Dragon APT41, a dual espionage and cyber crime operation SPECIAL REPORT | 2019 | 587 | 68 | FireEye | 
|  |  |  |  |  | 
|  |  |  |  |  | 
|  |  |  |  |  |