1. B. Abolghasem, IAEA Report: The growing resilience of Iran’s nuclear program (Foreign Policy J., 2012),
http://www.foreignpolicyjournal.com/2012/02/27/iaea-report-the-growing-resilience-of-irans-nuclear-program/
. Accessed 5 May 2013
2. M. Ahlers, Inside a government computer attack exercise (CNN, 2011),
http://edition.cnn.com/2011/10/17/tech/innovation/cyberattack-exercise-idaho/index.html
. Accessed 5 May 2013
3. A. Klimburg (ed.), National cyber security framework manual (NATO CCD COE publication, 2012),
http://www.ccdcoe.org/publications/books/NationalCyberSecurityFrameworkManual.pdf
. Accessed 5 May 2013
4. C. Ashton, Press conference on the launch of the EU’s cyber security strategy (2013),
http://www.consilium.europa.eu/uedocs/cms_Data/docs/pressdata/EN/foraff/135287.pdf
. Accessed 5 May 2013
5. C. Malmström, Stepping up the fight against cybercriminals to secure a free and open internet (Press conference on the launch of the EU’s cyber security strategy, 2013),
http://europa.eu/rapid/press-release_SPEECH-13-105_en.htm
. Accessed 5 May 2013