1. Adriaans, P. (2020). Information, The Stanford Encyclopedia of Philosophy (Fall 2020 Edition), Edward N. Zalta (ed.); https://plato.stanford.edu/archives/fall2020/entries/information/.
2. Bennett, B. W. (2003). et al. Responding to asymmetric threats. New Challenges, New Tools for Defense Decision-making, 1st ed., RAND Corporation, pp. 33–66. JSTOR, http://www.jstor.org/stable/10.7249/mr1576rc.11.
3. Carpenter, P. (2020). The dangerous art of media and messaging manipulation, Forbes, Int. ed., 2020/08/03, https://www.forbes.com/sites/forbesbusinesscouncil/2020/08/03/the-dangerous-art-of-social-media-and-messaging-manipulation/?sh=4b661cdf3f69.
4. CHM – Computer History Museum, https://www.computerhistory.org/timeline/software-languages/.
5. Ćurčić, M. (2018). Asymmetric Threats in Security Studies, In: Stojanovic, Stanislav, ed., Asymmetry and Strategy. Thematic Collection of Articles, Strategic Research Institute & National Defence School.