1. 360Helios (2016): Operation Mermaid. Hg. v. 360 Core Security. Online verfügbar unter https://blogs.360.cn/post/operation-mermaid.html, zuletzt aktualisiert am 30.05.2016, zuletzt geprüft am 01.09.2021.
2. Achmatova, Nina (2012): Former oligarch appeals to the Patriarch for regime change in Russia. Hg. v. AsiaNews.it. Online verfügbar unter http://www.asianews.it/news-en/Former-oligarch-appeals-to-the-Patriarch-for-regime-change-in-Russia-23726.html, zuletzt aktualisiert am 18.01.2012, zuletzt geprüft am 29.04.2021.
3. Adams, Gordon; Williams, Cindy (2010): Buying national security: How America plans and pays for Its global role and safety at home. New York: Routledge.
4. Adamsky, Dmitry (2017): The Israeli Odyssey toward its National Cyber Security Strategy. In: The Washington Quarterly 40 (2), S. 113–127. DOI: 10.1080/0163660X.2017.1328928.
5. Agrafiotis, Ioannis; Bada, Maria; Cornish, Paul; Creese, Sadie; Goldsmith, Michael; Ignatuschtschenko, Eva et al. (2016): Cyber Harm: Concepts, Taxonomy and Measurement. Hg. v. SAID Business School. University of Oxford (Saïd Business School RP, 2016–23). Online verfügbar unter https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2828646.