1. Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber security. J. Digit. Forensics Secur. Law 12(2), 53–74 (2017)
2. Denning, P.J., Denning, D.E.: Cybersecurity is harder than building bridges. Am. Sci. 104,154–157 (2016)
3. Espinosa, N.: The five laws of cybersecurity (2018). TEDxFondduLac. http://www.ted.com/talks/nick_espinosa_the_five_laws_of_cybersecurity
4. Karnouskos, S.: Stuxnet worm impact on industrial cyber-physical system security. In: IECON 2011–37th Annual Conference of the IEEE Industrial Electronics Society, pp. 4490–4494 (2011)
5. Marszal, E.M., McGlone, J.: Security PHA Review for Consequence-Based Cybersecurity. NC 27709, ISA, USA (2019)