1. Bourgeois, D. and Bourgeois, D.T. (2014) Information Systems Security. In: Information Systems for Business and Beyond. https://ecampusontario.pressbooks.pub/infosysbus/chapter/chapter-6-information-systems-security
2. Cyber-Attack Attributes
3. The influencing causes of software unavailability: A case study from industry
4. Information System Penetration Testing Using Web Attack Automated Simulation
5. Roguski, P. (2020) Russian Cyber Attacks against Georgia, Public Attributions and Sovereignty in Cyberspace. https://ruj.uj.edu.pl/xmlui/bitstream/handle/item/153044/roguski_russian_cyber_attacks_against_georgia_2020.pdf?sequence=1&isAllowed=y