Benkler, Y. (2000). "From Consumers to Users: Shifting the Deeper Structures of Regulation Toward Sustainable Commons and User Access." Federal Communications Law Journal, 25(3), 561–579.
Binxing, F., Peng, Z., and Shibing, Z. (2016). "Research on Cyberspace Sovereignty." Strategic Study of Chinese Academy of Engineering Description, 18(6).
Blane, J. V. (2001). Cyberwarfare: Terror at a Click. Nova Science Pub Inc.
Bush, J. E. (2021). Cyberspace for the Operational Artist: Every Planner has the Tools to Understand the Cyber Domain.
Choucri, N., and Clark, D. D. (2012). "Integrating Cyberspace and International Relations: The Co-Evolution Dilemma." ECIR Working Paper No. 2012-3.
Clark, D. (2010). Characterizing Cyberspace: Past, Present, and Future (ECIR Working Paper No. 2010-3). MIT Political Science Department.
Fanelli, R., and Conti, G. (2012). "A Methodology for Cyber Operations Targeting and Control of Collateral Damage in the Context of Lawful Armed Conflict." 4th International Conference on Cyber Conflict (CYCON 2012), 319–331.
Gleason, D. H., and Friedman, L. (2005). "Proposal for an Accessible Conception of Cyberspace." Journal of Information, Communication and Ethics in Society, 3(1), 15–23.
Grant, T. (2014). "On the Military Geography of Cyberspace." 9th International Conference on Cyber Warfare and Security (ICCWS 2014), 66–76.
Kademi, A., and Koltuksuz, A. (2017). "Formal Characterization of Cyberspace for Cyber Lexicon Development." ECCWS 2017 16th European Conference on Cyber Warfare and Security.
Karimi Ghohroudi M.R, Moeinazad, Sh., and Karimi Ghohroudi E. (2023). "Typology of the Concept and Main Elements of Cyberspace in National Cyber Security Strategy of Selected Countries". National Security, 13(47), 9-36. {In Persian}
Lehto, M. (2015). "Phenomena in the Cyber World. In Martti Lehto and Pekka Neittaanmäki." Cyber Security: Analytics, Technology and Automation (pp. 3–29). Springer.
Libicki, M. C. (2007). Conquest in Cyberspace: National Security and Information Warfare. Cambridge University Press.
Limonier, K., Douzet, F., Pétiniaud, L., Salamatian, L., and Salamatian, K. (2021). "Mapping the routes of the Internet for geopolitics: The case of Eastern Ukraine." First Monday, 26(5).
Ning, H. (2022). A Brief History of Cyberspace. CRC Press (Auerbach Publications).
Raymond, D., Conti, G., Cross, T., and Fanelli, R. (2013). "A Control Measure Framework to Limit Collateral Damage and Propagation of Cyber Weapons." 5th International Conference on Cyber Conflict (CYCON 2013), 1–16.
Raymond, D., Conti, G., Cross, T., and Nowatkowski, M. (2014). "Key Terrain in Cyberspace: Seeking the High Ground." 6th International Conference on Cyber Conflict (CyCon 2014), 287–300.
Riley, S. (2014, October 7). Cyber Terrain: A Model for Increased Understanding of Cyber Activity [Blogspot Article]. http://cyber-analysis.blogspot.com/2014/10/cyber-terrain-model-for-increased.html
Ruth, I. (2017). "Multi-dimensional structural data integration for proactive cyber-defence." International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA), 1–9.
Sheldon, J. B. (2011). "Deciphering Cyberpower: Strategic Purpose in Peace and War." Strategic Studies Quarterly, 5(2), 95–112.
U.S. Joint Chiefs of Staff. (2013). Cyberspace Operations (Joint Publication (JP) 3-12(R)).
Van den Berg, J., van Zoggel, J., Snels, M., van Leeuwen, M., Boekee, S., van de Koppen, L., van der Lubbe, J., van den Berg, B., and de Bos, T. (2014). "On (The Emergence of) Cyber Security Science and Its Challenges for Cyber Security Education." Proceedings of the NATO IST-122 Cyber Security Science and Engineering Symposium.
Venables, A. (2021). "Modelling Cyberspace to Determine Cybersecurity Training Requirements." Frontiers in Education, 6(768037).
Venables, A., Shaikh, S. A., and Shuttleworth, J. (2015a). "A Model for Characterizing Cyberpower." 9th International Conference on Critical Infrastructure Protection (ICCIP), 3–16.
Venables, A., Shaikh, S. A., and Shuttleworth, J. (2015b). "The projection and measurement of cyberpower." Security Journal, 30(3), 1000–1011.
Ventre, D. (2012). Cyber Conflict: Competing National Perspectives. Wiley-ISTE.
Waltz, E. (1998). Information Warfare Principles and Operations. Artech House.
Zimet, E., and Skoudis, E. (2009). "A Graphical Introduction to the Structural Elements of Cyberspace". In Kramer, F. D., Starr, S. H. and Wentz, L. K., Cyberpower and National Security (pp. 91–112). University of Nebraska Press, Potomac Books.
Zimmermann, H. (1980). "OSI Reference Model—The ISO Model of Architecture for Open Systems Interconnection." IEEE Transactions on Communications, 28(4), 425–432.