Andress, J. & Winterfeld, S. (2011). Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners. Boston, MA: Syngress.
Bouchard, M., and H. Nguyen. (2009) “Is it Who You Know or How Many That Counts? Criminal Networks and Cost Avoidance in a Sample of Young Offenders.” Justice Quarterly 27, no. 1
Brenner, Susan. Cyberthreats: The Emerging Fault Lines of the Nation State. New York: Oxford University Press, 2008.
Chandler and R Boadhurst, "Social Engineering and Crime Prevention in Cyberspace," Queensland Univeristy of Technology, Brisbane, 2006.
Carr, J. (2011). Inside Cyber Warfare: Mapping the Cyber Underworld. Sebastopol, CA: O'Reilly Media Incorporated.
Clarke, R.A. and Knake, R.K. (2010). Cyber War: The Next Threat to National Security and What to Do About It New York, NY: Ecco.
Decary-Hetu, David, and Benoit Dupont. “The Social Network of Hackers.” Global Crime 13 (2012)
F. Barbhuiya, S. Biswas, N. Hubballi, and S. Nandi, “A host based DES approach for detecting arp spoofing,” in Computational Intelligence in Cyber Security (CICS), 2011 IEEE Symposium on, april 2011
Holt, Thomas J., Deborah Strumsky, Olga Smirnova, and Max Kilger. “Examining the Social Networks of Malware Writers and Hackers.” International Journal of Cyber Criminology 6 (2012)
Holt, Thomas J., and Eric Lampke. “Exploring Stolen Data Markets On-line: Products and Market Forces.” Criminal Justice Studies 23 (2010)
Kramer, F.D., Starr, S.H., & Wentz, L. eds. (2009). Cyberpower and National Security. Washington D.C.: National Defense University Press and Potomac Books.
Lowenthal, Mark M. Intelligence: From Secrets to Policy. 5th ed. Washington, DC: CQ Press, 2012.
Liu, E.C., (2013, January). Reauthorization of the FISA Amendments. Congressional Research Service Report for Congress, 7-5700, R42725. Available online at: http://www.fas.org/sgp/crs/intel/R42725.pdf.
Menn, J. (2010). Fatal System Error, New York, NY: Public Affairs.
Tremblay, P., M. Bouchard, and S. Petit. “The Size and Influence of a Criminal Organization: A Criminal Achievement Perspective.” Global Crime 10 (2009)
Markham, Annette N. “Internet Research.” In Qualitative Research: Issues of Theory, Method, and Practice. 3rd ed., edited by David Silverman, 111-127. Thousand Oaks, CA: Sage, 2011.
M. Tavallaee, E. Bagheri, W. Lu, and A. Ghorbani, “A detailed analysis of the kdd cup 99 data set,” in Computational Intelligence for Security and Defense Applications, 2009. CISDA 2009. IEEE Symposium on, july 2009
O. Linda, M. Manic, T. Vollmer, and J. Wright, “Fuzzy logic based anomaly detection for embedded network security cyber sensor,” in Computational Intelligence in Cyber Security (CICS), 2011 IEEE Symposium on, april 2011
S. Yu and D. Dasgupta, “An effective network-based intrusion detection using conserved self pattern recognition algorithm augmented with near-deterministic detector generation,” in Computational Intelligence in Cyber Security (CICS), 2011 IEEE Symposium on, april 2011
Wang, Q., W. T. Yue, and K. Hui. (2012) “Do Hacker Forums Contribute to Security Attacks?” Lecture Notes In Business Information Processing 108
Frontline: Behind Taliban Lines, February 23,2010. Available online at:
Federation of American Scientists publishes various reports at http://www.fas.org/pubs/briefs.html or http://www.fas.org/blog/secrecv/.
Foreign Spies Stealing US Economic Secrets in Cyberspace: Report to Congress on Foreign Economic Collection and Industrial Espionage. (2011). Counterintelligence Security, Office of the National Counterintelligence Executive. Available online at:
http://www.ncix.gov/publications/reports/fecie all/Foreign Economic Collection 2011.pdf.
Cyberwar: War in the Fifth Domain. (2010). The Economist. Online at: http://www.economist.com/node/16478792
Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy. This text is a 2010 compilation of papers prepared by the National Research Council. For more information: http://www.nap.edu/catalog.php7record id=12997.
FBI. “Directorate of Intelligence, Intelligence Collection Disciplines.” http://www.fbi.gov/about-us/intelligence/disciplines
Chu, Bill, Thomas J. Holt, and Gail Joon Ahn. Examining the Creation, Distribution, and Function of Malware On-Line. Washington, DC: National Institute of Justice, 2010. Accessed April 11, 2011. http://www.ncjrs.gov/pdffiles1/nij/grants/230112.pdf.
Dunn, Justin E. “Russia Cybercrime Market Doubles in 2011, Says Report.” IT World (2012). Accessed September 23. http://www.itworld.com/security/272448/russia-cybercrime-market- doubles-2011-says-report.
Symantec Corporation. Symantec Internet Security Threat Report, Vol. 17. Accessed June 20, 2012. http://www.symantec.com/threatreport.