1. Balzarotti D (2015) 10+ years of system security circus.
http://s3.eurecom.fr/~balzarot/notes/top4/index.html
. Accessed Jan 2018
2. Betts RK (1993) Paranoids, pygmies, pariahs and nonproliferation revisited. In: Davis ZS, Benjamin F (eds) The proliferation puzzle: Why nuclear weapons spread (and what results). F. Cass, London
3. Billo CG, Chang W (2004) Cyber warfare. an analysis of the means and motivations of selected nation states. Tech. rep., Institute for Security Technology Studies at Darmouth College
4. Bryan K (2009) Capability of the people’s republic of china toconduct cyber warfare and computer network exploitation. Tech. rep., Northrop Grumman Corporation
5. Carr J (2012) Inside cyber warfare. Mapping the cyber underworld, 2nd edn. O’reilley, Sebastopol