[Arreguin-Toft, I. (2001). How the weak win wars: A theory of asymmetric conflict. International security, Vol. 26, Issue 1, 93-128.]Search in Google Scholar
[Baker, M. (2013). State of cyber workforce development. Software Engineering Institute, Carnegie Mellon University.]Search in Google Scholar
[Bazzell, M. (2016). Open source intelligence techniques: resources for searching and analyzing online information. Create Space Independent Publishing Platform.]Search in Google Scholar
[Beggs, R. W. (2014). Mastering Kali Linux for advanced penetration testing. Packt Publishing Ltd.]Search in Google Scholar
[Bruneau, E., & Kteily, N. (2017). The enemy as animal: Symmetric dehumanization during asymmetric warfare. PloS one, Vol. 12, Issue 7.10.1371/journal.pone.0181422552898128746412]Search in Google Scholar
[Cheung, R. S., Cohen, J. P., Lo, H. Z., & Elia, F. (2011). Challenge based learning in cybersecurity education. In Proceedings of the International Conference on Security and Management (SAM) (p. 1). The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp), Las Vegas Nevada, USA: CSREA Press.]Search in Google Scholar
[Cielen, D., Meysman, A., & Ali, M. (2016). Introducing data science: big data, machine learning, and more, using Python tools. Shelter Island, NY: Manning Publications Co.]Search in Google Scholar
[Davey, J., & Armstrong, H. L. (2001). An Approach to Teaching Cyber Warfare Tools and Techniques. Journal of Information Warfare, Vol. 1, Issue 2, 87-94.]Search in Google Scholar
[Dawson, M., & Omar, M. (2015). New Threats and Countermeasures in Digital Crime and Cyber Terrorism. Hershey, PA: IGI Global. doi:10.4018/978-1-4666-8345-710.4018/978-1-4666-8345-7]Search in Google Scholar
[Dawson, M., Wang, P., & Williams, K. (2018). The role of cae-cde in cybersecurity education for workforce development. Information Technology-New Generations. Springer, Cham.10.1007/978-3-319-77028-4_20]Search in Google Scholar
[Gikas, C. (2010). A general comparison of fisma, hipaa, iso 27000 and pci-dss standards. Information Security Journal: A Global Perspective, Vol. 19, Issue 3, 132-141.]Search in Google Scholar
[Helms, C. P. (2015). The Digital GCC: USCYBERCOM as a Combatant Command. Air Command and Staff College Maxwell Air Force Base United States, Alabama, SUA.10.21236/AD1012758]Search in Google Scholar
[Hollis, D. M. (2010). USCYBERCOM: The need for a combatant command versus a subunified command. Washington Dc: National Defense University Press.]Search in Google Scholar
[Hu, J., Cordel, D., & Meinel, C. (2004). A Virtual Laboratory for IT Security Education. Proceedings of EMISA International Conference on Informationssysteme im E-Business und E-Government (EMISA), Vol. 56, 60-71.]Search in Google Scholar
[Kim, E., Wells Jr, W. G., & Duffey, M. R. (2003). A model for effective implementation of Earned Value Management methodology. International Journal of Project Management, Vol. 21, Issue 5, 375-382.]Search in Google Scholar
[Najera-Gutierrez, G., & Ansari, J. A. (2018). Web Penetration Testing with Kali Linux: Explore the methods and tools of ethical hacking with Kali Linux. Birmingham, UK: Packt Publishing Ltd.]Search in Google Scholar
[Newhouse, W., Keith, S., Scribner, B., & Witte, G. (2017). National initiative for cybersecurity education (NICE) cybersecurity workforce framework. NIST Special Publication, 800, 181.10.6028/NIST.SP.800-181]Search in Google Scholar
[Ranasinghe, N., Karunanayaka, K., Cheok, A. D., Fernando, O. N. N., Nii, H., & Gopalakrishnakone, P. (2011). Digital taste and smell communication. Proceedings of the 6th International Conference on Body Area Networks, 78-84, Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering (ICST).10.4108/icst.bodynets.2011.247067]Search in Google Scholar
[Schneider, F. B. (2013). Cybersecurity education in universities. IEEE Security & Privacy, Vol. 11, Issue 4, 3-4.]Search in Google Scholar
[Tzu, S. (2014). The art of war. Strategic Studies, 86-110, Routledge.]Search in Google Scholar
[U.S. Cybercom. (n.d.). Command History, available at: https://www.cybercom.mil/About/History/, accessed on 22 December 2019.]Search in Google Scholar
[Vijayan, J. (2009). Defense Secretary Gates approves creation of U.S. Cyber Command, available at: https://www.computerworld.com/article/2525896/defense-secretary-gates-approves-creation-of-u-s--cyber-command.html, accessed on 22 December 2019.]Search in Google Scholar
[Wang, M., Callaghan, V., Bernhardt, J., White, K., & Peña-Rios, A. (2018). Augmented reality in education and training: pedagogical approaches and illustrative case studies. Journal of Ambient Intelligence and Humanized Computing, Vol. 9, Issue 5, 1391-1402.]Search in Google Scholar
[Wang, P., Dawson, M., & Williams, K. L. (2019). Improving cyber defense education through national standard alignment: Case studies. National Security: Breakthroughs in Research and Practice, 78-91, IGI Global.]Search in Google Scholar
[Wong, E. (2005). Swift Road for US Citizen Soldiers Already Fighting in Iraq. New York Times.]Search in Google Scholar