1. Abbott, Kenneth W. (1993). “‘Trust but verify:’ the production of information in arms control treaties and other international agreements”. Cornell International Law Journal 26.
2. Abbott, K., & Snidal, D. (2000). Hard and soft law in international governance. International Organization, 54(3), 421–456.
3. Baruah, Darshana M. (2013). “Cyberspace governance: the American approach”, October 4. https://www.indiawrites.org/cyberspace-governance-the-american-approach/ .
4. Buchanan, B. (2016). The life cycles of cyber threats. Survival, 58(1), 39–58.
5. Carr, Jeffrey. (2011). Inside cyber warfare. Mapping the cyber underworld, 2nd ed. (O'Reilly Media).