Amorosi, D., “Chinese State of Denial,” Infosecurity, Vol 8 Issue 6, Elsevier, Nov.-Dec. 2011.
 Andress, J. and Winterfeld, S., “Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners,” Elsevier, 2011, p. 199.
 Applegate, S. D., “Cybermilitias and Political Hackers: Use of Irregular Forces in cyberwarfare,” IEEE Security & Privacy, Volume 9, Issue 5, Sep.-Oct. 2011.
 Arquilla, J. and Ronfeldt D. F., “Networks and Netwars: The Future of Terror, Crime, and
Hillier F.S. and Liberman G.J. (2001). Introduction to Operation Research. McGraw Hill,7th Ed: New York, 726.
Hämäläinen J., Sormunen J., Rantapelkonen J., Nikkarila J-P. (2014).Wargame as a combined method of qualitative and quantitative studies, Journal Of Military Studies, 5(1):1-18.
Kaufmann A. and Gupta M.M. (1991). Introduction to Fuzzy Arithmetic: Theory and Applications, Van Nostrand Reinhold: New York, 74-84.
Law W.W. and Pan S.Y. (2008). Game theory and educational policy: Private education legislation in China
-Narratives; Narrating, resisting, making sense. Studies in Narrative, Volume 4: 33-38. Philadelphia: John Benjamin Publishing Company.
Rimmon-Kenan, Shlomith (1983). Narrative Fiction: Contemporary Poetics. London and New York: Methuen.
Sawyer, Ralph D. ed. (1993). The Seven Military Classics of Ancient China. Boulder: Westview Press.
Todorov, Tzvetan (1981). Introduction to Poetics. Minneapolis: University of Minnesota Press.
Triandafillov, Vladimir K. (1994). The Nature of the Operations of Modern Armies
retrieves North Korean Unha-3 Rocket debris. Retrieved January 8, 2013, from spaceflight101: http://www.spaceflight101.com/unha-3-launch-updates-kwangmyongsong-3-2.html
CGWIC (2011). User's manual. Retrieved November 20, 2012, from China Great Wall Industry Corporation: http://www.cgwic.com/LaunchServices/Download/manual/index.html
Christy, R. (2012a, April). Unha 3/ Kwangmyongsong 3 Launch failure. Retrieved May 10, 2012, from Zarya: http://www.zarya.info/Diaries/NKorea/Unha3Impact.php
Christy, R. (2012b, December
.1080/07408170490487759 Hopp W. J. Van Oyen M. P. 2004 Agile workforce evaluation: a framework for cross-training and coordination IIE Transactions 36 10 919 940
Hou, Y., Guo, W., & Zhu, Z. (2010). Threat assessment based on variable parameter dynamic Bayesian network. In: Proceedings of the 29th Chinese Control Conference , Beijing, China. Hou Y. Guo W. Zhu Z. 2010 Threat assessment based on variable parameter dynamic Bayesian network Proceedings of the 29th Chinese Control Conference Beijing China
Hudson, L. D., Ware, B. S., Laskey, K. B., & Mahoney, S. M. (2001). An application of
Helga Myrseth, Olav Kjellevold Olsen, Einar Kristian Borud and Leif Åge Strand
. Murphy J.S. Horn D. B. 2010 Are soldiers gamers? Videogame usage among soldiers and implications for the effective use of serious videogames for military training Military Psychology 22 143 157
Qin, H., Rao, P. L., & Zong, H. Q. (2007). A study of factors leading to online game addiction. Chinese Journal of Clinical Psychology, 15 , pp. 155-160. Qin H. Rao P.L. Zong H. Q. 2007 A study of factors leading to online game addiction Chinese Journal of Clinical Psychology 15 155 160
Rehbein, F., Kleimann, M., & Mössle, T. (2010). Prevalence and