1. Alberts DS, Garstka JJ, Stein FP (2000) Network centric warfare: developing and leveraging information superiority, 2nd revised ed. CCRP, Washington
2. Arquilla J, Ronfeldt D (eds) (2001) Networks and netwars: the future of terror, crime, and militancy. RAND, Santa Monica
3. Ashenden D (2011) Cyber security: time for engagement and debate. In: Ottis R (ed) Proceedings of the 10th european conference on information warfare and security (ECIW 2011, Tallinn). Academic Publishing, Reading, UK, pp 11–16
4. Beggs C (2006) Proposed risk minimization measures for cyber-terrorism and SCADA networks in Australia. In: Remenyi D (ed) Proceedings of the 5th european conference on information warfare and security (ECIW 2006, Helsinki). Academic Publishing, Reading, UK, pp 9–18
5. Bergqvist J (2010) Sinä olet sodassa: Sofistikoitujen algoritmien kamppailua kyberavaruudessa. Suomen sotilas 91(5):6–10