1. Two-factor authentication scheme using one time password in cloud computing;El-sherif,2018
2. Network Attacks and Exploitation. A Framework;Monte,2015
3. Assessing the Computer Network Operations Threat of Foreign Countries;Denning,2007
4. Deterring Cyber Warfare. Bolstering Strategic Stability in Cyberspace;Mazanec,2014