1. Cyberattack on a German steel-mill (2016). https://www.sentryo.net/cyberattack-on-a-german-steel-mill/
2. Celik, Z.B., McDaniel, P., Tan, G.: SOTERIA: automated IoT safety and security analysis (2018). https://arxiv.org/pdf/1805.08876
3. Lecture Notes in Computer Science;R Chadha,2008
4. Lecture Notes in Computer Science;M Clavel,2007
5. Dolev, D., Yao, A.: On the security of public key protocols. IEEE Trans. Inf. Theory 29(2), 198–208 (1983)