1. Global Fraud Report—Annual Edition 2011–2012, Kroll, 2011 〈http://www.krollconsulting.com/fraud-report/2011-12/press-only/〉.
2. In the Crossfire: Critical Infrastructure in the Age of Cyber War, 2010 〈http://www.mcafee.com/us/resources/reports/rp-in-crossfire-critical-infrastructure-cyber-war.pdf〉.
3. Information Sharing Strategy—National Intelligence, 2008 〈http://www.dni.gov/reports/IC_Information_Sharing_Strategy.pdf〉.
4. NATO Network Enabled Capability, 2011 〈http://nnec.act.nato.int/〉.
5. H.F. Lipson, Tracking and Tracing Cyber-Attacks: Technical Challenges and Global Policy, vol. 154, University of Pennsylvania Law Review, 2006, p. 477.