Heginbotham, Eric. (2015) The U.S.-China military scorecard : forces, geography, and the evolving balance of power http://www.rand.org/content/dam/rand/pubs/research_reports/RR300/RR392/RAND_RR392.pdf
Schmidt, Lara. (2015) Perspective on 2015 DoD Cyber Strategy http://www.rand.org/content/dam/rand/pubs/testimonies/CT400/CT439/RAND_CT439.pdf
Shafqat, N., & Masood, A. (2016). Comparative analysis of various national cyber security strategies. International Journal of Computer Science and Information Security, 14(1), 129-136. Retrieved from http://search.proquest.com/docview/1764183576?accountid=8289
Maitra, A. K. (2015). Offensive cyber-weapons: Technical, legal, and strategic aspects. Environment Systems & Decisions, 35(1), 169-182. doi:http://dx.doi.org/10.1007/s10669-014-9520-7
Chansoria, M. (2012). DEFYING BORDERS IN FUTURE CONFLICT IN EAST ASIA: CHINESE CAPABILITIES IN THE REALM OF INFORMATION WARFARE AND CYBER SPACE. The Journal of East Asian Affairs, 26(1), 105-0_8. Retrieved from Shibboleth Authentication Request
Cilluffo, F. J., & Cardash, S. L. (2013). Cyber domain conflict in the 21st century. The Whitehead Journal of Diplomacy and International Relations, 14(1), 41-47. Retrieved from Shibboleth Authentication Request
Korns, S. W., & Kastenberg, J. E. (2009). Georgia’s cyber left hook. Parameters, 38(4), 60-76. Retrieved from Shibboleth Authentication Request
‘Turf war’ slows new U.S. cyber rules. (2012). C4ISR, , 12. Retrieved from Shibboleth Authentication Request
Helms, R., Costanza, S. E., & Johnson, N. (2012). Crouching tiger or phantom dragon? examining the discourse on global cyber-terror. Security Journal, 25(1), 57-75. doi:Crouching tiger or phantom dragon? Examining the discourse on global cyber-terror | Security Journal
Cobb, J., U.S.A.F. (2011). Centralized execution, decentralized chaos: How the air force is poised to lose a cyber war. Air & Space Power Journal, 25(2), 81-86. Retrieved from Shibboleth Authentication Request