1. AFP News Agency. (2005). Hacker Attacks in US Linked to Chinese Military [Electronic Version]. Breitbart.com, 12.12.2005. Retrieved April 2008 from
http://www.breitbart.com/article.php?id=051212224756.jwmkvntb&show_article=1
.
2. Bachfeld, D. (2003). War der Wurm drin? c’t, 2003(18), 34.
3. Berinato, S. (2002). Cybersecurity – The Truth About Cyberterrorism [Electronic Version]. CIO Magazine. Retrieved April 2008 from
http://www.cio.com/article/30933/CYBERSECURITY_The_Truth_About_Cyberterrorism
.
4. Borland, J. (1998). Analyzing the Threat of Cyberterrorism [Electronic Version]. Techweb. From
http://www.techweb.com/showArticle.jhtml?articleID=29102707
.
5. Brunst, P. W. (2008). Use of the Internet by Terrorists – A Threat Analysis. In Centre of Excellence – Defence Against Terrorism (Ed.), Responses to Cyber Terrorism (pp. 34–60). Amsterdam: IOS Press.