1. J. Bozic and F. Wotawa, Security testing based on attack patterns, Proceedings of the Seventh IEEE International Conference on Software Testing, Verification and Validation Workshops, pp. 4–11, 2014.
2. Z. Flom, Shedding light on BlackEnergy with open source intelligence, Recorded Future Blog (
www.recordedfuture.com/blackenergy-malware-analysis
), March 3, 2016.
3. E. Gamma, R. Helm, R. Johnson and J. Vlissides, Design Patterns: Elements of Reusable Object-Oriented Software, Addison-Wesley, Boston, Massachusetts, 1994.
4. M. Gegick and L. Williams, Matching attack patterns to security vulnerabilities in software-intensive system designs, Proceedings of the Workshop on Software Engineering for Secure Systems - Building Trustworthy Applications, 2005.
5. M. Havis, Chernobyl under attack: Computers “shut down” at nuclear disaster plant, Daily Star, June 27, 2017.