1. Industrial communication networks—Network and system security—Part 3-3: System security requirements and security assurance levels, Standard 62443/FDIS-3-3 (ISA-99.03.03), TC65WG10, January 2013
2. Cherkashin, V., Feifer, G.: Spy Handler: A Memoir of a KGB Officer: The True Story of the Man Who Recruited Robert Hanssen and Aldrich Ames. Basic Books (2008)
3. Livingston, S., Sanborn, S., Slaughter, A., Zonneveld, P.: Managing cyber risk in the electric power sector. Deloitte. As of 17 (2019) [Online]. Available: https://www2.deloitte.com/us/en/insights/industry/power-and-utilities/cyber-risk-electric-power-sector.html
4. CIGRE WG D2.38: TB 698—framework for EPU operators to manage the response to a cyber-initiated threat to their critical infrastructure. CIGRE, Technical Brochure #698 (2017) [Online]. Available: https://e-cigre.org/home.asp
5. CIGRE WG D2.46.: TB 796—cybersecurity: future threats and impact on electric power utility organisations and operations. CIGRE Study Committee D2, CIGRE, 21, rue d'Artois, 75008 Paris, FRANCE, Technical Brochure 796 (2020) [Online]. Available: https://e-cigre.org/home.asp