1. Ghassemi M, Naumann T, Schulam P, Beam AL, Ranganath R (2018) Opportunities in machine learning for healthcare. arXiv preprint arXiv:1806.00388
2. Bojarski M, Del Testa D, Dworakowski D, Firner B, Flepp B, Goyal P, Jackel LD, Monfort M, Muller U, Zhang J et al (2016) End to end learning for self-driving cars. arXiv preprint arXiv:1604.07316
3. Junejo KN, Yau DK (2016) Data driven physical modelling for intrusion detection in cyber physical systems. In: Proceedings of the Singapore Cyber-Security Conference (SG-CRC). IOS Press, Tokyo, Japan, pp 43–57
4. Abrams M, Weiss J (2008) Malicious control system cyber security attack case study—Maroochy Water Services, Australia. Tech. Rep., The Mitre Corporation, McLean, VA. http://csrc.nist.gov/groups/SMA/fisma/ics/documents/Maroochy-Water-Services-Case-Study_briefing.pdf
5. Lipovsky R (2016) New wave of cyber attacks against Ukrainian power industry. http://www.welivesecurity.com/2016/01/11