丁諭祺、詹偉銘、張光宏、周國森、施君熹(2014),以WARGAME型式建立資訊安全攻防演練平台,資訊安全通訊 20卷4期,P.72-83。
林敬皇(2013),網路攻防演練框架設計及基於雲端實證資料下虛擬機器效能模型之研究,成功大學電腦與通信工程研究所博士學位論文。徐志朋(2018),雲端式網路攻擊鏈數位靶場教學演練實驗平台之設計與實作,健行科技大學資訊工程系碩士班學位論文。張群岳(2003),網路虛擬演習系統之建置與評估,臺北醫學大學醫學資訊研究所學位論文。
張錫鈴(2010),電子郵件社交工程與資訊安全認知行為之研究探討-以某企業為例,虎尾科技大學資訊管理研究所學位論文。
陳信文、蔡一郎(2019),CDX2.0平台攻防場域課程設計與實作,NCS 2019 全國計算機會議,P.188-191。
陳彥甫(2012),殭屍網路測試自動化環境架設與實驗執行,中原大學資訊工程研究所學位論文。
黃鳳珠(2017),各國資訊安全政策的比較研究,淡江大學資訊管理學系碩士在職專班學位論文。聶順成、梁德容、王尉任(2018),基於OpenStack開發之資訊安全演練平台,TANET2018 臺灣網際網路研討會,P.2205-2208。
Furtuna A., Patriciu V.V., & Bica Ion(2010). A Structured Approach for Implementing Cyber Security Exercises. Romania:IEEE.
Heuer, Richards J., Jr, "Chapter 8: Analysis of Competing Hypotheses", Psychology of Intelligence Analysis, Center for the Study of Intelligence, Central Intelligence Agency
Patriciu, V.V., & Furtuna, A.C. (2009) Guide for designing cyber security exercises. Proceedings of the 8th WSEAS International Conference on E-Activities and Information Security and Privacy, pp. 172–177. World Scientific and Engineering Academy and Society, WSEAS
Seker E.(2018) The Concept of Cyber Defence Exercises (CDX): Planning, Execution, Evaluation.2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security). IEEE
Sergio C., Pendergast A., & Betz C.(2013 July) The diamond model of intrusion analysis, DTIC Document Tech. Rep.
White G. B., Dietrich G., & Tim Goles(2004). Testing an Organization’s Ability to Prevent, Detect, and Respond to Cyber Security Events. Proceedings of the 37th Hawaii International Conference on System Sciences. Hawaii.
Wilhelmson N., & Svensson T.(2014) Handbook for planning running and evaluating information technology and cyber security exercises. Swedish National Defence College Center for Asymmetric Threats Studies (CATS).
Kolb A. , Kolb D. A. (2005). Experiential Learning Theory bibliography. Experience Based Learning Systems, Inc. Cleveland, OH. Retrieved from www.learningfromexperience.com. (May 1, 2020)
Kick, J.(2014) Cyber exercise playbook. Technical report, DTIC Document. Retrieved from https://www.mitre.org/publications/technical-papers/cyber-exercise-playbook.(May 1, 2020)
Sean T Malone (2016) Using an Expanded Cyber Kill Chain Model to Increase Attack Resiliency. Black hat USA 2016. Retrieved from https://www.blackhat.com/docs/us-16/materials/us-16-Malone-Using-An-Expanded-Cyber-Kill-Chain-Model-To-Increase-Attack-Resiliency.pdf .(May 1, 2020)