1. Hassanzadeh, A., Modi, S., Mulchandani, S.: Towards effective security control assignment in the industrial internet of things. In: Internet of Things (WF-IoT), IEEE 2nd World Forum (2015)
2. Industrial Internet of Things Volume G4: Security Framework, IIC:PUB:G4:V1.0:PB:20160926
3. Muna, A.H., Moustafa, N., Sitnikova, E.: Identification of malicious activities in Industrial Internet of Things based on deep learning models. J. Inf. Secur. Appl. 41, 1–11 (2018)
4. Defense Use Case. Analysis of the Cyber Attack on the Ukrainian Power Grid. Electricity Information Sharing and Analysis Center (E-ISAC) 388 (2015). https://africautc.org/wp-content/uploads/2018/05/E-ISAC_SANS_Ukraine_DUC_5.pdf. Accessed 7 May 2022
5. Alladi, T., Chamola, V., Zeadally, S.: Industrial control systems: cyberattack trends and countermeasures. Comput. Commun. 155, 1–8 (2020)