1. Arimatsu, L. (2012). A treaty for governing cyber-weapons: Potential benefits and practical limitations. In C. Czosseck, K. Ziolkowski, & R. Ottis (Eds.), Proceedings of the 2012 4th International Conference on Cyber Conflicts (pp. 91–109). Tallinn: CCD COE Publications.
2. Cahill, T., & Rozinov, K. (2003). Cyber warfare peacekeeping. Assurance Workshop, 2003.
3. Council of Europe. (2001). Convention on cybercrime. Retrieved January 1, 2012, from http://conventions.coe.int/treaty/en/treaties/html/185.htm
4. Deibert, R., Manchanda, A., Rohozinski, R., Villeneuve, N., & Walton, G. (2009). Tracking ghostnet: Investigating a cyber espionage network. Information Warfare Monitor, Munk Centre, JR02-2009, March (Vol. 29, p. 53).