1. Adams, J. (2001, May/June). Virtual defense. Foreign Affairs, 98–112.
2. Aggarwal, V. (2009, August 3). Lead: Cyber crime’s rampant. Express Computer. http://www.expresscomputeronline.com/20090803/market01.shtml . (Accessed 22 October 2009).
3. Baron, W. R. (1997, Spring). Volpe engineers use biometrics to help ease border crush. Volpe Journal, available at: http://www.volpe.dot.gov/infosrc/journal/spring97/biomet.html (Accessed 22 October 2009).
4. Bickers, C. (2001, August 16). Combat on the Web. Far Eastern Economic Review, 30–33.
5. Blank, S. (2004). Rethinking the concept of asymmetric threats in US strategy. Comparative Strategy, 23(4/5), 343–367.