[Barron, E. (2013). Game Theory, an Introduction, Second Edition, ch. 3., John Wiley & Sons, Inc.10.1002/9781118547168]Search in Google Scholar
[Heriyanto, T., & Allen, L. (2014). Kali Linux: Assuring Security by Penetration Testing, Birmingham: Packt Publishing.10.1016/S1353-4858(14)70077-7]Search in Google Scholar
[Min Xie Yuan-Shun Dai, & K.-L. Poh. (2004). Computing System Reliability Models and Analysis, Kluwer Academic Publishers, 101-104.]Search in Google Scholar
[Moga, H., & Boşcoianu, M. (2015). Massive Cyber-attacks Patterns Implemented with BDI Agents, 6th International Conference on Aerospace, Robotics, Manufacturing Systems, Mechanical Systems, Mechanical Engineering, Biomechatronics and Neurorehabilitation (Applied Mechanics and Materials. OPTIROB, ICAEM, ICREB 2015), Vol. 811, 383-389.10.4028/www.scientific.net/AMM.811.383]Search in Google Scholar
[Moga, H., & Boşcoianu, M. (2016). Using BDI Agents in Flexible Patterns for Cyber-Attacks over Electrical Power Infrastructures, Applied Mechanics and Materials, IACSIT/IACT/UASTRO OPTIROB, 97-104.10.4028/www.scientific.net/AMM.841.97]Open DOISearch in Google Scholar
[Moga, H., & Ogîgău-Neamțiu, F. (2017). Modelarea amenințării cibernetice interstatale utilizând evaluarea polieuristică a deciziilor, In Managementul situațiilor de risc în contextul crizelor de securitate, Sibiu: Editura Academiei Forțelor Terestre „Nicolae Bălcescu”.]Search in Google Scholar
[Ogîgău-Neamțiu, F., & Moga, H. (2017). Profilul psihologic al războinicului cibernetic și hackerului non-statal bazat pe matricea de decizie polieuristică, In Managementul situațiilor de risc în contextul crizelor de securitate, Sibiu: Editura Academiei Forțelor Terestre „Nicolae Bălcescu”.]Search in Google Scholar
[Poisel, R. A. (2013). Information Warfare and Electronic Warfare Systems, In Artech House Electronic Warfare Library, ch. 4, 107-139, Boston, London: Artech House Publishers.]Search in Google Scholar
[Pritchett, W. L., & Smet, D. (2013). Kali Linux Cookbook. Birmingham: Packt Publishing.]Search in Google Scholar
[Warden, J. A. (2000). The Enemy as a System, available at: http://www.ciar.org/ttk/mbt/strategy.Warden.enemy-as-a-system.html.]Search in Google Scholar