1. Antonius, N. & Rich, L. (2013). Discovering collection and analysis techniques for social media to improve public safety. The International Technology Management Review, 3(1), 42–53.
2. Azani, E. (2018). Global Jihad – The Shift from Hierarchal Terrorist Organizations to Decentralized Systems.
3. Bardóczi Á. (2018). Nyílt-forrású információszerzés – kémek, kurvák, gengszterek, OSINT. NetAcademia LLC.
4. Capano, D. E. (2019). The human asset in cybersecurity. https://www.controleng.com/articles/the-human-asset-in-cybersecurity/
5. Crosston, M. & Valli, F. (2017). An Intelligence Civil War: “HUMINT’” Vs. “TECHINT”. Cyber, Intelligence, and Security, 1(1), 67–82.