1. Arasu, A., Babcock, Babu, S., et al.: STREAM: The Stanford Data Stream Management System. White Paper Department of Computer Science, Stanford University (2004). http://ilpubs.stanford.edu:8090/641/1/2004-20.pdf. Drawn: 30 April 2020
2. N.N.: Improving Vehicle Cybersecuritry, Alliance for Telecommunications Industry Solutions, Qwashington (2017). https://access.atis.org/apps/group_public/download.php/35648/ATIS-I-0000059.pdf. Drawn: 30 April 2020
3. Ballüder, K., Pietsch, S.-L., Langmack, B.: So bringen Sie Legacy Anwendungen in die Cloud (How to bring legacy applications to the cloud), COMPUTERWOCHE 5.3.2020. https://www.computerwoche.de/a/so-bringen-sie-legacy-anwendungen-in-die-cloud,3548100. Drawn: 30 April 2020
4. Beckereit, F., Wittmann, I., Keller, L., et al.: Überblick Software Defined „X“ – Grundlage und Status Quo (Overview Software Defined “X” – Basis and Status Quo). Bitkom https://www.bitkom.org/noindex/Publikationen/2016/Leitfaden/Software-Defined-X/160209-LF-SDX.pdf (2016), Drawn: 30 April 2020
5. N.N.: IT-Sicherheit für die Industrie 4.0, Abschlussbericht BMWi Studie (IT Security for Industry 4.0, Final Report BMWi Study) (2016). https://www.bmwi.de/Redaktion/DE/Publikationen/Studien/it-sicherheit-fuer-industrie-4-0.pdf?__blob=publicationFile&v=4. Drawn: 30 April 2020