1. Ablon, L., M.C. Libicki, and A.A. Golay. 2014. Markets for Cybercrime Tools and Stolen Data: Hackers’ Bazaar. Santa Monica, CA: RAND Corporation. Research report.
2. Aradau, C. 2010. Security that matters: Critical infrastructure and objects of protection. Security Dialogue 41(5): 491–514.
3. Arimatsu, L. 2012. A treaty for governing cyber-weapons: Potential benefits and practical limitations. In Proceedings of the 4th International Conference on Cyber Conflict, 5–8 June, Tallinn, Estonia, eds. C. Czosseck, R. Ottis and K. Ziolkowski, 91–109. Tallinn: NATO CCD COE Publications.
4. Arquilla, J. 2016. Foreword: Ethics for the coming epoch of conflict. In Binary Bullets: The Ethics of Cyberwarfare, ed. F. Allhoff, A. Henschke, and B.J. Strawser, vii–xii. New York: Oxford University Press.
5. Arquilla, J., and D. Ronfeldt. 1993. Cyberwar is coming! Comparative Strategy 12(2): 141–165.