1. Ackerman, S. (2010, 13 October). Doc of the day: NSA, DHS trade players for net defense. Danger Room. Retrieved on February 6, 2011, from http://www.wired.com/dangerroom/2010/10/doc-of-the-day-nsa-dhs-trade-players-for-net-defense/
2. Alexander, G. K. (2010). U.S. cybersecurity policy and the role of U.S. CYBERCOM. Presentation to Center for Strategic and International Studies, 3 June.
3. Building a new command in cyberspace.;G. K.Alexander;Strategic Studies Quarterly,2011
4. Bellovin, S. (2011, 18 November). Water supply system apparently hacked, with physical damage. CircleID. Retrieved on February 6, 2011 from http://www.circleid.com/posts/20111118_water_supply_system_apparently_hacked_with_physical_damage
5. The cyberwar debate: Perception and politics in U.S. critical infrastructure protection.;R.Bendrath;Information & Security: An International Journal,2001