1. Australian Cyber Security Centre. (n.d.). Essential eight. Retrieved 4 8, 2021, from Australian Government - Australian Signals Directorate: https://www.cyber.gov.au/acsc/view-all-content/essential-eight
2. Bennett, M., & Waltz, E. (2007). Counterdeception principles and applications for national security. ArTech House.
3. Bowden, M. (2011). Worm - the first digital world war. Atlantic Monthly Press.
4. Bradley Greaver, L. R. (2017). CARVER 2.0: Integrating the Analytical Hierarchy Process’s multi-attribute decision-making weighting scheme for a center of gravity vulnerability analysis for US Special Operations Forces. Journal of Defense Modeling and Simulation, 15(1), 111–120.
5. Chairman of the Joint Chiefs of Staff (CJCS). (2019, 3 8). Methodology for combat assessment (CJCSI 3162.02). Retrieved 6 22, 2020, from Joint Chiefs of Staff: https://www.jcs.mil/Portals/36/Documents/Doctrine/training/jts/cjcsi_3162_02.pdf?ver=2019-03-13-092459-350