1. Pascal Ackerman 2021 Industrial Cybersecurity - Efficiently monitor the Cybersecurity Posture of your ICS Environment Packt Publishing 2 Birmingham UK 978-1-800-20209-2
2. Nikita Aggarwal, Horst Eidenmüller, Luca Enriques, Jennifer Payne, Kristen van Zwieten: Autonomous Systems and the Law. C.H.Beck Verlag, Munich, Germany, 2019. ISBN 978-3-4067-3683-4
3. Mohiuddin Ahmed, Abdun Naser Mahmood, Jiankun Hu: A Survey of Network Anomaly Detection Techniques Journal of Network and Computer Applications, Elsevier, Amsterdam, Netherlands, Vol. 60, 2016, pp. 19–31. Downloadable from: https://www.gta.ufrj.br/~alvarenga/files/CPE826/Ahmed2016-Survey.pdf [Last accessed: 6.6.2021]
4. AI-HLEG: Ethics Guidelines for Trustworthy AI European Commission High-Level Expert Group on Artificial Intelligence, Brussels, Belgium, 2019. Downloadable from: https://digital-strategy.ec.europa.eu/en/library/ethics-guidelines-trustworthy-ai [Last accessed: 24.5.2021]
5. John R. Allen, Amir Husain: On Hyperwar Proceedings of the US Naval Institute, Vol. 143, Nr. 7, July 2017. Available from: https://www.usni.org/magazines/proceedings/2017/july/hyperwar [Last accessed: 2.6.2021]