https://www.amazon.com/Introduction-Cyber-Warfare-Multidisciplinary-Paulo-Shakarian/dp/0124078141 (accessible via scribd)
https://arxiv.org/abs/1309.6450
The Dragon and the Computer: Why Intellectual Property Theft is Compatible with Chinese Cyber-Warfare Doctrine
https://theconversation-com.cdn.ampproject.org/v/s/theconversation.com/amp/north-korea-targeted-cybersecurity-researchers-using-a-blend-of-hacking-and-espionage-154236?amp_js_v=a6&_gsa=1&usqp=mq331AQHKAFQArABIA%3D%3D#aoh=16178033535798&referrer=https%3A%2F%2Fwww.google.com&_tf=%E4%BE%86%E6%BA%90%EF%BC%9A%251%24s&share=https%3A%2F%2Ftheconversation.com%2Fnorth-korea-targeted-cybersecurity-researchers-using-a-blend-of-hacking-and-espionage-154236