آلبرتس، دیوید س و دانیل س پاپ (1385)، گزیده ای از عصر اطلاعات؛ الزامات امنیت ملی در عصر اطلاعات، ترجمه علی علی آبادی و رضا نخجوانی، تهران: پژوهشکده مطالعات راهبردی.
روزنا، جیمز و دیگران (1390)، انقلاب اطلاعات، امنیت و فناوری های جدید، ترجمه؛ علیرضا طیب، تهران: پژوهشکده مطالعات راهبردی.
کاستلز، مانوئل(1380)، عصر اطلاعات: اقتصاد، جامعه و فرهنگ، مترجمان؛ احمد علیقلیان، افشین خاکباز، تهران: طرح نو.
غروی حسین، محمدی علی (1390) معرفی رویکردها و متدولوژیهای طراحی واجرای سناریوهای مقابله با تهدیدات سایبری، تهران: انتشارات دانشگاه دفاع ملی، مجموعه مقالات همایش ملی دفاع سایبری.
منوچهری، عباس (1376)، قدرت، مدرنیسم و پستمدرنیسم،اطلاعات سیاسی اقتصادی، شماره 122-121.
هانس جو اکیم مور گنتا (1389)،سیاست میان ملتها: تلاش در راه قدرت و صلح، مترجم: حمیرا مشیرزاده، تهران: وزارت امور خارجه.
منابع انگلیسی
Bagchi, Indrani (2008), “China Mounts CyberAttacks on Indian Sites,” The Times of India, May 5, 2008.
Benedikt Michael. (1992) Cyberspace: First Steps, Cambridge, MIT Press.
Betz J. David andStevens Tim (2011),Cyberspace and The State: Toward a Strategy For Cyber - Power, The International Institute for Strategic Studies (IISS)
Bollier, David (2003), The Rise of Netpolik; How the Internet Is ChangingInternational Politics and Diplomacy,A Report of the Eleventh Annual Aspen InstituteRoundtable on Information Technology.
Bryant, Rebecca (2001), What Kind Of Space Is Cyberspace?, Minerva, 5:138-155.
Bunn, M. Elaine (2011), Can Deterrence Be Tailored? Strategic Forum, No. 225.
Cheswick William R. andBellovin Steven M. (2003), Firewalls and Internet Security: Repelling the Wily Hacker (2nd Edition).
Clarke Richard A. and Knake Robert. (2012), Cyber War: The Next Threat to National Security and What to Do About It, Paperback press.
Crampton, JeremyW. (2004), The Political Mapping of Cyberspace,Chicago: University of Chicago Press.
Eriksson, John and Giocomello(2006), “The Information Revolution, Security, and International Relations: (IR) relevant Theory?” International Political Science Review (2006), Vol. 27, No. 3, 221-244.
George, Alexander L. and Richard Smoke (1974), Deterrence in American Foreign Policy: Theory and Practice, New York: Columbia University Press.
Gibson, W. (1984) Neuromancer. New York, Ace Books.
Goodman, Will (2010), “Cyber Deterrence: Tougher in Theory than in Practice,” Strategic Studies Quarterly, Vol.4, No.3.
Kramer, Franklin D .et al (2009), Cyberpower and National Security, Dulles: National Defense University Press and Potomac Books.
Kuehl T. Daniel (2009) From Cyberspace to Cyberpower: Defining the Problem," in FD Kramer, S. Starr, L.K. Wentz (ed. ) (2008), Cyberpower and National Security, National Defense University Press, Washington (DC)
Kugler, Richard L. (2009), “Deterrence of Cyber Attacks,” in Franklin D. Kramer et al (2009), Cyberpower and National Security, Dulles: National Defense University Press and Potomac Books, Inc.
Libicki, Martin C. (2009)Cyber deterrence and cyberwar, USA, Rand Corporation.
Lin, Herbert. (2011) ‘Responding to sub-threshold cyber intrusions: a fertile topic for research and discussion’, inGeorgetown Journal of International Affairs, Special Issue, International Engagement on Cyber:Establishing International Norms and Improved Cybersecurity, pp. 127–135.
Morgan, Patrick M. (2010), “Applicability of Traditional Deterrence Concepts and Theory to the Cyber Realm,” paper presented at a workshop on deterring cyberattacks, Washington DC.
Nye, J (2011), The Future of Power in the 21st Century, New York: Public Affairs Press.
Starr ,Stuart H. (2008), Developing a theory of cyber power, in FD Kramer, S. Starr, L.K. Wentz (ed. )Georgetown Journal of International Affairs, Special Issue, International Engagement on Cyber:Establishing International Norms and Improved Cybersecurity, pp. 127–135.