1. Anonymous (2018) APT10 was managed by the Tianjin bureau of the Chinese Ministry of State Security. Intrusion Truth.
https://intrusiontruth.wordpress.com/2018/08/15/apt10-was-managed-by-the-tianjin-bureau-of-the-chinese-ministry-of-state-security/
. Last access 7 July 2019
2. Brunoni L (2016) Private cyberwars and the right to hack back. Jusletter.
https://jusletter.weblaw.ch/juslissues/2016/872/private-cyberwars-an_d13bbca261
.html__ONCE. Last access 7 July 2019
3. Denning DE, Strawser BJ (2017) Active cyber defence: applying air defence to the cyber domain. Carnegie Endowment for International Peace
https://carnegieendowment.org/2017/10/16/active-cyber-defence-applying-air-defence-to-cyber-domain-pub-73416
. Last access 7 July 2019
4. Dewar R (2017) Active cyber defence. Research Gate.
https://www.researchgate.net/profile/Robert_Dewar5/publication/321057804_Active_Cyber_Defence/links/5a0af4570f7e9b0cc024f3c2/Active-Cyber-defence.pdf?origin=publication_detail
. Last access 7 July 2019
5. Dittrich D, Himma KE (2005) Active response to computer intrusions. In: Handbook of information security 3. Wiley, New Jersey, pp 664–681.
https://staff.washington.edu/dittrich/misc/handbook-arc.pdf
. Last access 7 July 2019