[1]تافلر الوین ، تافلر هایدی، (1400)، ثروت انقلابی، مترجم رضا امیر رحیمی، چاپ اول، انتشارات نشر ماهی.
[2] حاجیزاده سیروس و دیگران(1396)، چالشهای نظری عمقبخشی در محیط پیرامون، فصلنامه سیاست دفاعی، زمستان 1396، دوره26، شماره 101.
[3]مقدمفر حمیدرضا و آهویی محسنی ابراهیم(1399)، جنگ شناختی علم پیروزی در نبرد ذهنها، تهران، انتشارات خبرگزاری تسنیم.
[4] محمدی نجم، سیدحسین(1395)، جنگشناختی؛ بعد پنجم جنگ، مؤسسه آموزشی و تحقیقاتی صنایع دفاعی.
[5]گری، کریس هیبلز(1381)، جنگ پست مدرن، سیاست نوین درگیری، مترجم احمد رضا تقاء، انتشارات دانشکده فرماندهی و ستاد معاونت تحقیق و پژوهش.
[6]کاستلز، امانوئل. عصر اطلاعات: اقتصاد، جامعه و فرهنگ: قدرت هویت؛ کاستلز، مانوئل و حسین [7]بصیریان جهرمی. قدرت ارتباطات؛ تافلر، آلوین و هایدی، به سوی تمدن جدید: سیاست در موج سوم؛ جنگ و پاد جنگ (زنده ماندن در سپیده دم سده بیست و یکم).
[8]Thagard, p (2018),Cognitive science. Stanfotd encyclopedia of philosophy. Retrieved8 november (2019) at https//. Stanford. Edu/entries/ Cognitive- science.
[9] Ambel,J,)2018( MWI podcast: war and the human brain, with dr james Giordano retrieved2020onlinefrom:https//mwi,usma.edu/mwi-podcast-war-human-brain–dr-jamesgiordani.
[10] bienvenue, e. rogers, z. and troath, s. (2018). Cognitive warfare: the fight we, vegot. Retrieved 15 january 2020 on line from www.cov. org.au/adaptation/article Cognitive- warfare-the- fight- weve-got.
[11] burke,m(2000). Thought warfare and anti- warfare, defence science and technology organisation, salisbury.
[12] tzu, s. (1994), The art of war. Translated by ralph d. sawyer. New York: barnes and noble
[13] Szfranski, R ,(1997), neocortical warfre? The acme of skill, In john arquilla and david ronfeldt, in Athena s camp, Rand MR 880-osd-rc, santa monica, 1997.pp.395416.
[14] Nickolson, p.(2006), Effects-based strategy: operation in the Cognitive domain.
[15] Nancy, J,) 1980(, dies irae. Ufaculte dejuger, Ed,Jacques derrida etal, Paris: minuit
]Chater N, Oaksford M. 2008
[16] cognitive appropriation: Appropriation of knowledge is the process of constructing knowledge from social and cultural sources, and integrating it into pre-existing schemas. Appropriation draws on the developmental theories of Piaget and Vygotsky, as both the cognitive and social-constructivist views of learning are equally emphasized.
[17] Hammes, t.x(1994), The evolution of war: the forth generation, marine corps gazette, septamber 1994 Retrieved at 22 january)2020( online from https//www.d-n-i.net/fcs/hammes.htm.
[18] Tait A(2018),How to identify if an online video is fack. New statesman. Com 15 february 14 2018 Retrieved at 12 april 2020 on line from https://www. New statesman. Com.
[19] Scales, Robert H(2000), Adaptive Enemies: Achieving Victory by Avoiding Defeat".
[20] William C. Wohlforth and Vladislav M. Zubok, (2017), “An Abiding Antagonism: Realism, Idealism, and the Mirage of Western-Russian Partnership after the Cold War, International Politics 2017: 1-15
[21] Admiral,Kevin(2005) Effects-BasedOperations:Enchancing Operational Art & Design in the 21st Century.
[22] Ellsworth, James B(2007). Eyes on Target: Intelligence Support to an Effects-based Approach, Quarter, issue 46, 3ed.
[23] Finkelstein, Robert, (2011) A, Memetics Compendium.
[24] Giessa, Jeff,(2015), It’s Time To Embrace Memetic Warfare. p: 67-77
[25] Anthony, Judge.(2019), Tank Warfare Challenges for Global Governance: Extending the ‘think tank’ metaphor to include other cognitive modalities..
[26] Ministry of Defense of the Russian, 2011.
[27] Chekinov and Bogdanov, “The Nature and Content of a New-Generation War,” Military Thought 4, 2013: 12-23.
[28] Keir Giles,(2016),Handbook of Russian Information Warfare (NATO Defense College,Research Division.
[29] Mark Galeotti. (2018), I’m Sorry for Creating the ‘Gerasimov Doctrine,’ Foreign Policy,March 5
[30] Kay l(2017),innovation of military thought in the postmodern warfare era. Small wars jurnal Retrieved at 23 april )2020( online from https://www. Small wars jurnal. Com
[31] Monica, CA: RAND Corp. 2018
[32] Pynnöniemi Patri and András Rácz,(2016), “Fog of Falsehood: Russian Strategy of Deception and the Conflict in Ukraine,” FIIA Report 45.
[33] For further reading on the topic of the use of denigration measures in the Russian arena, which is considered a very common tool and not only by the regime, see Alina V. Ledeneva, , (2006) How Russia Really Works? The Informal Practices that Shaped Post-Soviet Politics and Business (Ithaca: Cornell University Press, 2006.
[34]Helmus, Bodine-Baron, and Radin, Russian Social Media Influence
[35]William C. Wohlforth and Vladislav M. Zubok, (2017), “An Abiding Antagonism: Realism, Idealism, and the Mirage of Western-Russian Partnership after the Cold War, International Politics 2017: 1-15
[36]Global Cyberattacks,” Walla, July 21, 2016
[37] Newsweek, February 22, 2017
[38] Timothy Thomas, (2014), “Russia’s Information Warfare Strategy: Can the Nation Cope in Future Conflicts?” Journal of Slavic Military Studies 27, no. 1: 101-30.
[39] United States of America v. Viktor Borisovich Netyksho, Boris Alekseyevich Antonov, . (2018), Dmitriy Sergeyevich Badin and co., Criminal No. (18 U.S.C. 2, 371,1030, 1028A, 1956, and 3551 et seq.), July 13, , US Department of Justice Website,
http://bit.ly/2XjTtmJ
[40] United States of America v(2018),Internet Research Agency LLC and Co., Criminal No. (18 U.S.C. 2, 371, 1349, 1028A), February 16, WilliamM,Arkin(2003).A New Midset for Warfare,” Washington Post,17 www.javan.ir/004vse.
[41] Joshua Keating,2010 “Who Was behind the Estonia Cyber Attacks?” Foreign Policy,December 7,
http://bit.ly/2U5d33V.
[42] Keir Giles,(2016),Handbook of Russian Information Warfare (NATO Defense College,Research Division.
[43]Yossi Kuperwasser and David Siman-Tov(2019),The Cognitive Campaign:Strategic and Intelligence Perspectives, Institute for National Security, Studies No. 197 October 2019.