1. Porter, Ch. (2024). Protecting those below the cyber-poverty line is critical to everyone. C4ISRNET. Jan 4. Retrieved from https://www.c4isrnet.com/opinion/2024/01/04/protecting-those-below-thecyber-poverty-line-is-critical-to-everyone/.
2. Demarest, C. (2024). Cyberattacks on Guam could sap US forces in Indo-Pacific, Nakasone says. C4ISRNET. Feb 1. Retrieved from https://www.c4isrnet.com/cyber/2024/01/31/cyberattacks-on-guam-couldsap-us-forces-in-indo-pacific-nakasone-says/.
3. Yevseiev, S., Melenti, Y., Voitko, O., Hrebeniuk, V., Korchenko, A., Mykus, S. et al. (2021). Development of a concept for building a critical infrastructure facilities security system. Eastern-European Journal of Enterprise Technologies, 3, 9 (111), 63–83. DOI: https://doi.org/10.15587/1729-4061.2021.233533.
4. Demarest, C. (2023). Pentagon seeks to rapidly build up information-warfare force. C4ISRNET. Nov 21. Retrieved from https://www.c4isrnet.com/information-warfare/2023/11/21/pentagon-seeksto-rapidly-build-up-information-warfare-force/.
5. Zakon Ukrainy Pro osvitu vid 5 veres. 2017 roku № 2145-VIII [Law of Ukraine On education from September 5 2017, № 2145-VIII]. zakon.rada.gov. ua. Retrieved from https://zakon.rada.gov.ua/laws/show/2145-19#Text [in Ukrainian].