- Bar, S., (2020). Israeli strategic deterrence doctrine and practice. Tandfonline,3(1), 321-353. Published online: https://www.tandfonline.com/doi/abs/10.1080/01495933.2020.1772624
- BBC News. )2014(. Israel halts weapons shipment from Iran [WWW Document]. BBC News. URL https://www.bbc.com/news/world-middleeast-26451421
- Bencsáth, B., Ács-Kurucz, G., Molnár, G., Vaspöri, G., Buttyán, L., & Kamarás, R., (2015). Duqu 2.0: A comparison to Duqu. Budapest: Budapest University of Technology and Economics. https://www.crysys.hu/publications/files/duqu2.pdf
- Bencsath, B., Felegyh´azi, M., Buttyan, L., & Gabor, P., (2012). The Cousins of Stuxnet: Duqu, Flame, and Gauss. Budapest: Budapest University of Technology and Economics. mdpi.com/journal/futureinternet
- Bendiek, A., & Metzger, T., (2015). Deterrence theory in the cyber-century Lecture Notes in Informatics (LNI). Bonn: Gesellschaft für Informatik
- Ben-Horin, Y., & Posen, B., (1981). Israel's Strategic Doctrine.
- Burak Tolga, I., (2018). Principles of Cyber Deterrence and the Challenges in Developing a Credible Cyber Deterrence Posture. Estonia, Tallinn: CCDCOE.
- Cohen, M., & Freilich, C., (2016). Israel and Cyberspace: Unique Threat and Response. International Studies Perspectives, 1–15. https:// researchgate. net/ publication/ 288823312
- Cordey, S., (2019). The Israeli Unit 8200 – An OSINT-based study Trend Analysis. Center for Security Studies (CSS), ETH Zürich, https://doi.org/10.3929/ethz-b-000389135.
- Cristiano, F., (2020). Cyber defense and security as national trademarks of international legitimacy (Israel) in Romaniuk S. N. and Manjikian M. (2020, eds.) Routledge Companion to Global Cyber-Security Strategy.New York: Routlege.
- Cyber Fusion Team. (2018). Spies in the Middle East: Israeli Cyber Operations [WWW Document]. Secur. Alliance. URL https://www.secalliance.com/blog/spies-inthe-middle-east/
- Dehghani, A.A., (2018). Cyber Deterrence in the New Global Security: The Cyber Threat of Russia and China against Vital US Infrastructure. Political and International Approaches, 4(4), 121- 147.[in persion]
- (2019). How did the Stuxent virus enter the Natanz nuclear facility? https://www.dw.com/fa-ir [in persion]
- Eizenkot, G., (2016). Deterring Terror. How Israel Confronts the Next Generation of Threats. (Rosenberg, S., Trans.). Cambridge: Belfer Center.
- Frei, J., (2020). Israel’s National Cybersecurity and Cyberdefense Posture. Center for Security Studies (CSS), ETH Zürich.
- Fried, , (2020). Military, Civilian or Both: David Ben-Gurion’s Perception of National Security after the War of Independence. Contemporary Review of the Middle East, 7(2) 125–142.
- Gazit, , Brym, R.J., (2011). State-directed political assassination in Israel: A political hypothesis. International Sociology. 26(6) 862–877.
- Goodman, W., (2017). Cyber Deterrence: Tougher in Theory than in Practice? Strategic Studies Quarterly, 4(3), 102-135.
- (2019). Israel Says Iran Hacked Ex-general Gantz's Phone Ahead of Election. Haartez, 14.03.2019. https:// www.haaretz.com/ israel news/ elections/ benny- gantz- s-cellphone- hacked byiranian- intelligence-1.7022269
- Harkov, L., (2019). Politics: The cybersecurity election. The Jerusalem Post. 04.04.2019. https://www.jpost.com/Israel-Elections/Politics-Thecybersecurity-election-585802
- Holst, A., (2020. Israel: the Tech Innovation Nation, Released: October 2020 at: https://www.statista.com/study/82392/israel-the-tech-innovation-nation/ .
- (2018). 8200 Unit thwarts an ISIS attack [WWW Document]. IDF. URL https://www.idf.il/en/articles/terror-andthreats/8200-unit-thwarts-an-isis-attack /
- (2017). Israel National Cyber Security Strategy in Brief. Prime Minister Office. https://cyber.haifa.ac.il/images/pdf/cyber_english_A5_ final.pdf
- Libicki, M.C., (2009). Cyber deterrence and Cyberwar. In Cyber deterrence and Cyberwar, CA: RAND, 27-37.
- Liu, Sh., (2021). Active cybersecurity companies in Israel 2011-2020. Jan 18. https://www.statista.com/statistics/1003442/israel-cyber-security-companies/.
- Meisels, T., (2013). Assassination: Targeting Nuclear Scientists, Law and Philosophy (2014) 33: 207- 234.
- Muttahid Askari, E., (2000). Science and Technology in Israel. Regional Studies in Israeli Studies and American Studies 4. [in persion]
- Nye, J.S., (2017). Deterrence and Dissuasion in Cyberspace. International Security. International Security, 41(3), 44–71.
- Philbin, M.J., (2013). Cyber Deterrence: An Old Concept in a New Domain Carlisle. Available at: https://www.semanticscholar.org/ paper/ Cyber-Deterrence%3 A-An-Old-Concept- in- a- New- Domain Philbin/ 356d310b914e32596ea46f2beaf26048a5de1b2
- Rousseau, J.P., (2017). The history andimpact of unit 8200 on Israeli HI-TECH entrepreneurship. A Thesis Presented to The Honors Tutorial College. Ohio University.
- Ryan, N.J., (2018). Five Kinds of Cyber Deterrence. Technol. 31:331–338.
- Szmigiera, M., (2021). Research and development worldwide - Statistics & Facts. https://www.statista.com/topics/6737/research-and-development worldwide/?topicHeader wrapper
- Torabi, Q., (2016). An analysis of the military strategy document of the Zionist regime. National Watch, 54(3), 39-44. [in persion]
- World Intellectual Property Organization. (2020). Ranking the Tel Aviv startup ecosystem. https://www.savills.com/search/sitesearch.aspx?page=1&searchKeyRanking%20the%20Tel%20Aviv%20startup%20ecosystem&filter
- Zitun, Y., (2018). IDF’s Unit 8200 helped Australia thwart attempt to bomb plane. [WWW Document]. Ynet. URL https://www.ynetnews.com/articles/0,7340,L5124744,00.html
|