1. Bilar, D.: Degradation and subversion through subsystem attacks. IEEE Security and Privacy 8, 70–73 (2010). DOI10.1109/MSP.2010.122.
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=5523869
2. Bilar, D., Saltaformaggio, B.: Using a novel behavioral stimuli-response framework to defend against adversarial cyberspace participants. In: Cyber Conflict (ICCC), 2011 3rd International Conference on, pp. 169–185. CCD COE, IEEE, Tallinn, Estonia (2011).
http://www.ccdcoe.org/publications/2011proceedings/UsingANovelBehavioralStimuli-ResponseFramework...-Bilar-Saltaformaggio.pdf
3. Bowden, M.: Worm : The First Digital World War. Grove Press (2011)
4. Carin, L., Cybenko, G., Hughes, J.: Cybersecurity strategies: The queries methodology. Computer 41(8), 20–26 (2008). DOI10.1109/MC.2008.295.
http://dx.doi.org/10.1109/MC.2008.295
5. Fudenberg, D., Tirole, J.: Game Theory. The MIT Press, Cambridge MA (1991)