Bayuk, Jennifer L., and Barry M. Horowitz. "An Architectural Systems Engineering Methodology For Addressing Cyber Security." Systems Engineering 14.3 (2011): 294-304. Academic Search Complete. Web. 22 Jan. 2016.
French, Geoffrey. “Rethinking Defensive Information Warfare.” General Dynamics. White Granite Drive Suite 400, Oakton, VA. Jun 2004. Web. 14 January 2016.
Guri, Mordechai, et al. “AirHopper: Bridging the Air-Gap between Isolated Networks and Mobile Phones using Radio Frequencies.” IEEE, 2014. Web. Jan 18, 2016.
Hamed, Saber. Natanz Nuclear Facility. 2006. Photograph. Flickr. Web. Jan 28, 2016. <http://www.flickr.com/photos/hamed/237790717>
Interset. interset.com. 2015. Web. Jan 28, 2016. <https://www.interset.com/use-cases/cyber-attack-defense/>
Knott, Alexander, David S. Alberts, Cliff Wang. “Will Cybersecurity Dictate the Outcome of Future Wars?.” IEEE Computer Magazine. IEEE Computer Society, December 2015. Web. 14 January 2016.
Lee, Newton. “Counterterrorism and Cybersecurity: Total Information Awareness.” Springer. Springer. Second Edition. 2015. Web. 15 January 2016.
Moise, Adrian Christian. Aspects Regarding the Impact of the Internet on the Society. EBL. 2014.
Stalla-Bourdillon, Sophie, Joshua Phillips, Mark D. Ryan. “Privacy vs. Security.” SpringerBriefs in Cybersecurity. Springer, 2014. Web. 15 January 2016.