1 장노순, "안보수단의 비대칭화와 안보딜레마의 전이: 미국의 Stuxnet와 Drone 비교 연구" 국가안보전략연구원 15 (15): 185-219, 2015
2 엄정호, "사이버안보를 위한 능동적 사이버전 억제전략" 보안공학연구지원센터 10 (10): 403-416, 2013
3 김상배, "사이버 안보의 미중관계: 안보화 이론의 시각" 한국정치학회 49 (49): 71-97, 2015
4 장노순, "미국의 사이버전략 선택과 안보전략적 의미: 방어, 억지, 선제공격전략의 사례 비교 연구" 한국정치정보학회 19 (19): 57-92, 2016
5 CSIS Cyber Policy Task Force, "Working Group Discussion Papers" Center for Strategic and International Studies 2017
6 Sanger, David E., "U.S. Wrestles With How to Fight Back Against Cyberattacks"
7 Broad, William J., "U.S. Strategy to Hobble North Korea Was Hidden in Plain Sight"
8 "U.S. Presidential Policy Directive 41 (PPD41), U.S. Cyber Operation Policy"
9 Ingersoll, Geoffrey, "U.S. Navy: Hackers Jumping the Air Gap Would Disrupt the World Balance of Power"
10 Axelrod, Robert, "Timing of Cyber Conflict" 2014
1 장노순, "안보수단의 비대칭화와 안보딜레마의 전이: 미국의 Stuxnet와 Drone 비교 연구" 국가안보전략연구원 15 (15): 185-219, 2015
2 엄정호, "사이버안보를 위한 능동적 사이버전 억제전략" 보안공학연구지원센터 10 (10): 403-416, 2013
3 김상배, "사이버 안보의 미중관계: 안보화 이론의 시각" 한국정치학회 49 (49): 71-97, 2015
4 장노순, "미국의 사이버전략 선택과 안보전략적 의미: 방어, 억지, 선제공격전략의 사례 비교 연구" 한국정치정보학회 19 (19): 57-92, 2016
5 CSIS Cyber Policy Task Force, "Working Group Discussion Papers" Center for Strategic and International Studies 2017
6 Sanger, David E., "U.S. Wrestles With How to Fight Back Against Cyberattacks"
7 Broad, William J., "U.S. Strategy to Hobble North Korea Was Hidden in Plain Sight"
8 "U.S. Presidential Policy Directive 41 (PPD41), U.S. Cyber Operation Policy"
9 Ingersoll, Geoffrey, "U.S. Navy: Hackers Jumping the Air Gap Would Disrupt the World Balance of Power"
10 Axelrod, Robert, "Timing of Cyber Conflict" 2014
11 Glaser, Charles L., "The Security Dilemma Revisited" 50 : 1997
12 Kello, Lucas, "The Meaning of the Cyber Revolution" 38 (38): 2013
13 Mazanec, Brian M., "The Evolution of Cyber War" Potmac Books 2015
14 Group of the Group Experts, "Report of the Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security" UN General Assembly 2015
15 DoD Defense Science Board, "Report of Task Force on Cyber Deterrence" 2017
16 Shackelford, Scott J., "Managing Cyber Attacks in International Law, Business, and Relations: In Search of Cyber Peace" Cambridg University Press 2014
17 Jervis, Robert, "From Balance to Concert: A Study of International Security Cooperation" 38 (38): 1985
18 Center for Strategic and International Studies, "From Awareness to Action" CSIS Cyber Policy 2017
19 Sanger, David E., "Document Reveals Growth of Cyberwarfare Between the U.S. and Iran"
20 Sheldon, John B., "Deciphering Cyberpower: Strategic Purpose in Peace and War" (Summer) : 2011
21 Betz, David J., "Cyberspace and the State: Toward a Strategy for Cyber-Power" IISS 2011
22 Rosenzweig, Paul, "Cyber Warfare" Praeger 2013
23 Rid, Thomas, "Cyber War Will Not Take Place" 35 : 2012
24 Bell, Stephen, "Cut-Price Stuxnet Successors Possible: Kaspersky"
25 Jervis, Robert, "Cooperation under the Security Dilemma" 30 (30): 1978
26 Snyder, Jack, "Civil-Military Relations and the Cult of the Offensive, 1914 and 1984" 9 (9): 1984
27 paulson, E., "Better Timing of Cyber Conflict" Academy of Science and Enginerring 2014
28 Bilge, Leyla, "Before We Know It" CCS 2012
29 Tabansky, Lior, "Basic Concepts in Cyber Warfare" 3 (3): 2011
30 Iasiello, Emilio, "Are Cyber Weapons Effective Military Tools?" 7 (7): 2015
31 McGraw, Gary, "America’s Cyber Future" Center for a New American Security 2011
32 Tait, Robert, "Alleged Hacker Held in Prague at Center of ‘Intense’ US-Russian Tug of War"