1. Rid, T. Active Measures: The Secret History of Disinformation and Political Warfare (Farrar Straus and Giroux, New York, 2020).
2. Lin, H. & Zegart, A. (eds) Bytes, Bombs, and Spies: The Strategic Dimensions of Offensive Cyber Operations (Brookings Institution Press, London, 2019).
3. Simmons, G. J. How to insure that data acquired to verify treaty compliance are trustworthy. Proc. IEEE 76(5), 621–627 (1988).
4. National Academy of Sciences CISAC. Monitoring Nuclear Weapons and Nuclear-Explosive Materials: An Assessment of Methods and Capabilities (National Academies Press, London, 2005).
5. Fuller, J. Verification on the road to zero: issues for nuclear warhead dismantlement. Arms Control Today 40(10), 19–27 (2010).