Banks, S.B., Stytz, M. R., 1996. Software Security Requirements for Military Computer Generated Forces System Architectures. Simulation Industry Association of Australia DOI= http://www.siaa.asn.au/get/2396672378.pdf.
 Ceruti, M. G. 2003. Data Management Challenges and Development for Military Information Systems. IEEE Transactions on Knowledge and Data Engineering, September/October 2003. [OpenAIRE]
 Crawford, G. A. 1997. Information Warfare: New Roles for Information Systems in Military Operations. Technical Report Department of the Airforce, Washington DC. 1997.
 Beamount, P. 2010. US Appoints First Cyber Warfare General. News Report, The Observer, May 2010.
 Schell, R. R., Downey, P. J., Popek, G. J. 1973. Preliminary Notes on the Design of Secure Military Computer Systems. National Institute of Standards and Technology, US.
 Day, D. A. 2009. Ike's gambit: The KH-8 reconnaissance satellite. The Space Review, January 2009.
 Science News. 2009. World's Highest-Resolution Commercial Satellite.. Science Daily 2009
 Leyden, J. 2005. CIA Plays Cyber Wargame. News Report, The Register, May 2005.
 Bryant, J. H., Todd, M. A. 1965. The Design and Implementation of Automated Military Information Systems. IEEE Transactions on Military Electronics. Volume 9, Issue 2. 1965. 148-152.
 Farrell, N., 2007. Seagate hard drives turn into spy machines”, The Inquirer, November 2007.
 Prevelakis, V., Spinellis, D. 2007. The Athens Affair. IEEE Spectrum, July 2007. [OpenAIRE]