1. Alblabi, S. M., & Weir, G. (2018). User characteristics that influence judgment of social engineering attacks in social networks. Human Centric Computing and Information Sciences, 8(5).
2. Aldawood, H., Alashoor, T., & Skinner, G. (2020). Does awareness of social engineering make employees more secure? International Journal of Computer Applications, 177(38), 45–49.
3. Argonne National Laboratories. (2015). Analysis of critical infrastructure dependencies and interdependencies. US Department of Energy.
4. Assenza, G., & Setola, R. (2019). Operational technology cybersecurity: how vulnerable is our critical infrastructure? Contemporary Macedonian Defence, 19(37), 9–20.
5. Babu, B., Liyas, T., Muneer, P., & Varghese, J. (2017). Security issues in SCADA based industrial control systems. In 2nd International conference on anti-cyber crimes, Abha.