How CVSS is DOSsing your patching policy and wasting your money Available from http://media.blackhat.com/us-13/US-13-Allodi-HOW-CVSS- is-DOSsing-Your-Patching-Policy-Slides.pdf, 2013. ,
Does inequality lead to civil wars? A global long-term study using anthropometric indicators (1816???1999), European Journal of Political Economy, vol.32, pp.56-79, 2013. ,
DOI : 10.1016/j.ejpoleco.2013.06.007
On metrics and measurements in Dependability metrics: Advanced lectures, pp.7-13978, 2008. ,
Inside Cyber Warfare. O'Reilly Media, 2011. ,
Buying into the bias: Why vulnerability statistics suck Available from http://attrition.org/security/conferences/2013-07-BlackHat-Vuln_Stats- draft_22, 2013. ,
Online Politics: The Tools and Tactics of Digital Political Advocacy. Available from www, epolitics.com, 2011. ,
Lost in translation Available from: http://conference. hitb.org/hitbsecconf2013kul, 2013. ,
Operational aspects of cyberwarfare or cyberterrorist attacks: What a truly devastating attack could do In: Leading issues in information warfare & security research, J. Academic Publishing: Reading, vol.1, pp.35-53, 2011. ,
Cyber readiness index 1.0 Available from, 2013. ,
Some aspects on cyber war faring in information arena and cognitive domain Available from, 2007. ,
Internet usage statistics -The internet big picture Available from, 2013. ,
Twitter revolution: How the Arab Spring was helped by social media Available from: http://www.policymic.com/articles/10642/twitter-revolution-how-the- arab-spring-was-helped-by-social-media, 2012. ,
Cyber-Warfare Threatens Corporations: Expansion into Commercial Environments, Information Systems Management, vol.15, issue.2, pp.76-87, 2006. ,
DOI : 10.2307/249551
Applying traditional military principles to cyber warfare Available from: http://www.ccdcoe.org/publications, 2012. ,
Exposing One of China's Cyber Espionage Units Available http, 2013. ,
The role of social media in the Arab uprisings Available from: http://www.journalism.orgrole-social-media-arab-uprisings, 2012. ,
Cyber War Will Not Take Place, Journal of Strategic Studies, vol.36, issue.1, pp.5-32, 2012. ,
DOI : 10.1080/01495939308402915
Available from, Internet Security Threat Report, vol.18, 2013. ,
Available from: http://www.unicri.it/special_topics, 2013. ,
Causes of war: Power and the roots of conflict, 1999. ,
The Information Warfare Life Cycle Model, SA Journal of Information Management, vol.13, issue.1, p.476, 2011. ,
DOI : 10.4102/sajim.v13i1.476
The 2013 Data Breach Investigations Report Available from: http://www.verizonenterprise.com/ resources/reports/rp_data-breach-investigations-report, 2013. ,