L. Allodi and F. Massacci, How CVSS is DOSsing your patching policy and wasting your money Available from http://media.blackhat.com/us-13/US-13-Allodi-HOW-CVSS- is-DOSsing-Your-Patching-Policy-Slides.pdf, 2013.

J. Baten and C. Mumme, Does inequality lead to civil wars? A global long-term study using anthropometric indicators (1816???1999), European Journal of Political Economy, vol.32, pp.56-79, 2013.
DOI : 10.1016/j.ejpoleco.2013.06.007

R. Boehme and F. Freiling, On metrics and measurements in Dependability metrics: Advanced lectures, pp.7-13978, 2008.

J. Carr, Inside Cyber Warfare. O'Reilly Media, 2011.

S. Christey and B. Martin, Buying into the bias: Why vulnerability statistics suck Available from http://attrition.org/security/conferences/2013-07-BlackHat-Vuln_Stats- draft_22, 2013.

C. Delany, Online Politics: The Tools and Tactics of Digital Political Advocacy. Available from www, epolitics.com, 2011.

J. Espinahara and L. Eduardo, Lost in translation Available from: http://conference. hitb.org/hitbsecconf2013kul, 2013.

E. Filiol, Operational aspects of cyberwarfare or cyberterrorist attacks: What a truly devastating attack could do In: Leading issues in information warfare & security research, J. Academic Publishing: Reading, vol.1, pp.35-53, 2011.

M. Hathaway, Cyber readiness index 1.0 Available from, 2013.

R. Heickerö, Some aspects on cyber war faring in information arena and cognitive domain Available from, 2007.

S. Internet-world, Internet usage statistics -The internet big picture Available from, 2013.

S. Kassim, Twitter revolution: How the Arab Spring was helped by social media Available from: http://www.policymic.com/articles/10642/twitter-revolution-how-the- arab-spring-was-helped-by-social-media, 2012.

K. Knapp and W. Boulton, Cyber-Warfare Threatens Corporations: Expansion into Commercial Environments, Information Systems Management, vol.15, issue.2, pp.76-87, 2006.
DOI : 10.2307/249551

S. Liles, M. Rogers, J. Dietz, and D. Larson, Applying traditional military principles to cyber warfare Available from: http://www.ccdcoe.org/publications, 2012.

. Mandiant, Exposing One of China's Cyber Espionage Units Available http, 2013.

. Pewresearch, The role of social media in the Arab uprisings Available from: http://www.journalism.orgrole-social-media-arab-uprisings, 2012.

T. Rid, Cyber War Will Not Take Place, Journal of Strategic Studies, vol.36, issue.1, pp.5-32, 2012.
DOI : 10.1080/01495939308402915

. Symantec, Available from, Internet Security Threat Report, vol.18, 2013.

U. N. Cyberwarfare, Available from: http://www.unicri.it/special_topics, 2013.

S. Van-evera, Causes of war: Power and the roots of conflict, 1999.

B. Van-niekerk and M. Maharaj, The Information Warfare Life Cycle Model, SA Journal of Information Management, vol.13, issue.1, p.476, 2011.
DOI : 10.4102/sajim.v13i1.476

. Verizon, The 2013 Data Breach Investigations Report Available from: http://www.verizonenterprise.com/ resources/reports/rp_data-breach-investigations-report, 2013.