1. Adkins, A. 1997. Secret war: The navajo code talkers in world war II. New Mexico Historical Review 72(4): 10.
2. Almeshekah, M.H., E.H. Spafford, and M.J. Atallah. 2013. Improving security using deception. Technical Report 13, Purdue University, 11. CERIAS Tech Report 2013-13.
3. Anderson, R.J. 1993. Why cryptosystems fail. In Proceedings of the 1st ACM Conference on Computer and Communications Security (CCS’93), New York, 215–227. Association for Computing Machinery.
4. Anderson, R.J. 2020. Security Engineering: A Guide to Building Dependable Distributed Systems, 3 ed. Wiley Publishing.
5. Bishop, M. 2019. Computer Security Art and Science, 2nd ed. Addison-Wesley Professional.