1. Baram, Gil, und Udi Sommer. 2019. Covert or not covert: national strategies during cyber conflict. 2019 11th International Conference on Cyber Conflict (Cycon). https://ieeexplore.ieee.org/abstract/document/8756682. Zugegriffen: 09.03.2023.
2. Batemann, Jon. 2022. Russia’s wartime cyber operations in Ukraine: Military impacts, influences, and implications. Carnegie Endowment for International Peace 16. Dezember. https://carnegieendowment.org/2022/12/16/russia-s-wartime-cyber-operations-in-ukraine-military-impacts-influences-and-implications-pub-88657. Zugegriffen: 09.03.2023.
3. Beecroft, Nick. 2022. Evaluating the international support to Ukrainian Cyber defense. Carnegie endowment for international peace 3. November. https://carnegieendowment.org/2022/11/03/evaluating-international-support-to-ukrainian-cyber-defense-pub-88322. Zugegriffen: 09.03.2023.
4. Bigelow, Brad. 2019. What are Military Cyberspace Operations Other Than War? 2019 11th International Conference on Cyber Conflict (CyCon). https://ieeexplore.ieee.org/document/8756835. Zugegriffen: 09.03.2023.
5. Biller, Jeffrey T., und Michael N. Schmitt. 2019. Classification of cyber capabilities and operations as weapons, means, or methods of warfare. International Law Studies 95:179–225.