[1] M. khaleghi, “Cyber Def Doctrine Study Report V0.66,” Telecommunication Research Center (ITRC), 2019. (In Persian)##
[2] A. Molaee and M. kargari, and M. R. khorashadizadeh, “Pattern of deterrence in cyberspace based on game theory,” 2018. (In Persian)##
[3] M. H. Farokh and A. Mohammadi, “Conceptology Cyber deterrenc,” Supreme National Defense University, 2015. (In Persian)##
[4] S. Joseph, “Deterrence and Dissuasion in Cyberspace,” Nye Jr -2016.##
[5] B. Annegret and M. Tobias, “Deterrence theory in the cyber-century,” Working Paper RD EU/Europe, 2015.##
[6] M. Ahadi and M. Shahmohammadi, “Strategic plan of cyber defense of the Islamic Republic of Iran in the field of deterrence,” 2017. (In Persian)##
[7] A. A. Dehghani, “Cyber deterrence in the new global security: Russia and China cyber threat against US critical infrastructure,” Quarterly Journal of Political and International Approaches , Year 8, Issue 4, 2017. (In Persian)##
[8] F. D. Kramer, S. H. Starr, and L. K. Wentz, “Cyber power and national security Translation of the Vice Chancellor for Research and Production of Science,” Institute of Printing and Publishing, Faculty of Information, 2019. (In Persian)##
[9] Strategic document of the country's cyber passive defense, 2015. (In Persian)##
[10] Russia-U.S., “Bilateral on Cybersecurity Critical Terminology Foundations,” 2014.##
[11] T. M. McKenzie, “Is Cyber Deterrence Possible?,” USAF, Colonel Air Force Research Institute Perspectives on Cyber Power Published by Air University in January, 2017.##
[12] Cyber Deterrence Tougher in Theory than in Practice, Will Goodman Strategic Studies Quarterly, 2010.##
[13] Cyber Deterrence: A Comprehensive Approach? Dr Joe Burton1 Visiting Researcher, NATO Cooperative Cyber Defence Centre of Excellence (CCD COE) Senior Lecturer, New Zealand Institute for Security and Crime Science, University of Waikato, January 2018.##
[14] M. H. Farokh and A. Mohammadi, “Conceptology Cyber deterrenc,” Supreme National Defense University, 2015. (In Persian)##
[15] S. Lotfiyan, “Deterrence of nuclear ransom and war,” various theories of nuclear proliferation and use, Information newspaper, 1997. (In Persian)##
[16] H. Ashrafirizi and Z. Kazempoor, “The concept of political geography of information, Tehran, 2009. (In Persian)##
[17] A. M. Asgarkhani, “A look at theories of deterrence and control of nuclear weapons,Tehran,” Journal of Defense Policy, no. 25, 1998. (In Persian)##
[18] The Challenge of Cyber Attack Deterrence Kenneth Geers Naval Criminal Investigative Service (NCIS) Cooperative Cyber Defence Centre of Excellence (CCD COE), 2010.##
[19] F. Brantly, “The Cyber Deterrence Problem Aaron Assistant Professor,” Department of Political Science Virginia Polytechnic and State University United States, 2018.##
[20] Gh. R. jalali, “Studies of the comprehensive system of cyber defense operations,” Telecommunication Research Center (ITRC), 2019. (In Persian)##
[21] A. R. Ghaznavi, “Attached National Cyber Defense Information Network,” Ministry of Information and Communications Technology of Iran(ICT),Tehran, 2019. (In Persian)##