1. Alberts, D., Garstka, J, & Stein, F. (1999). Network centric warfare: Developing and leveraging information superiority. CCRP.
2. Alderman, R. (2015, July 7). Looking toward 7th and 8th generation warfare. Military Embedded Systems. https://military yembedded.com/unmanned/isr/looking-toward-7th-and-8th-generation-warfare#:~:text=Seventh%20Generation%20Warfare%20is%20totally,EMP%20(electromagnetic%20pulse)%20weapons.
3. Al-Sabri, B. (2023, January 15). Asymmetric threats: A study in the transformations of traditional deterrence strategies. Strategiecs Think Tank. https://strategiecs.com/en/analyses/a symmetric-threats-a-study-in-the-transformations-of-traditional-deterrence-strategies
4. Ballin, E., Dijstelbloem, H., & De Goede, P. (2020). The extension of the concept of security. In: E. Ballin et al., eds. Security in an interconnected world (pp. 13-39). Springer.
5. Bekkevold, J., Bowers, I., & Raska, M. (2015). Security, strategy and military change in the 21st century: Cross-regional perspectives. Rooutledge.