1. Hylton H. How Hizballah Hijacks the Internet. Time; August 8, 2006.
2. Bumgarner J, Borg S. Overview by the US-CCU of the Cyber-Campaign Against Georgia in August of 2008. US Cyber Consequence Unit Special Report; http://www.registan.net/wp-content/uploads/2009/08/US-CCU-Georgia-Cyber-Campaign-Overview.pdf August 2, 2009 [accessed April 23, 2013].
3. Shakarian P. Stuxnet: cyberwar revolution in military affairs. Small Wars Journal. http://smallwarsjournal.com/jrnl/art/stuxnet-cyberwar-revolution-in-military-affairs; April 2011 [accessed April 11, 2013].
4. Gorman S, Dreazen YJ, Cole A. $26 software is used to breach key weapons in Iraq; Iranian Backing Suspected. Wall Street Journal. http://online.wsj.com/article/SB126102247889095011.html; December 17, 2009 [accessed March 17, 2012].
5. Al Arabiya. Wikileaks might have triggered Tunis’ revolution. http://www.alarabiya.net/articles/2011/01/15/133592.html; January 15, 2011 [accessed April 11, 2013].