Wilson, Clay. "
Cyber Threats to Critical Information Infrastructure." In
Cyberterrorism, 123-136. New York, NY, USA: Springer, 2014.
Chen, Qi, Amanda Whitbrook, Uwe Aickelin, and Chris Roadknight. "
Data classification using the Dempster–Shafer method."
Journal of Experimental & Theoretical Artificial Intelligence 26, no. 4 (2014): 493-517.
David Delight Plus In
Operator's Manual. Canada: Mind Alive Inc., 2014.