1. Applegate, S. D. (2013). The dawn of kinetic cyber. In 2013 5th International Conference on Cyber Conflict (CyCon) (pp. 1–15) . New York: IEEE.
2. Falliere, N., Murchu, L. O., & Chien, E. (2011). W32. stuxnet dossier. White paper, Symantec Corp., Security Response, 5.
3. Slay, J., & Miller, M. (2007). Lessons learned from the Maroochy Water Breach. New York: Springer.
4. Lee, R. M., Assante, M. J., & Conway, T. (2014). German steel mill cyber attack. Industrial Control Systems, 30.
5. Koscher, K., Czeskis, A., Roesner, F., Patel, S., Kohno, T., Checkoway, S., et al. (2010). Experimental security analysis of a modern automobile. In 2010 IEEE Symposium on Security and Privacy (SP) (pp. 447–462). Piscataway: IEEE.