1. D. Alperovitch, Revealed: operation shady RAT, vol. 3. McAfee (2011), p. 2011
2. M.J. Assante, R.M. Lee, The industrial control system cyber kill chain. SANS Institute InfoSec Reading Room, 1 (2015)
3. C.Z. Bai, F. Pasqualetti, V. Gupta, Data-injection attacks in stochastic control systems: detectability and performance tradeoffs. Automatica 82, 251–260 (2017)
4. M. Brand, C. Valli, A. Woodward, Malware forensics: discovery of the intent of deception. J. Digit. Forensic Sec. Law 5(4), 2 (2010)
5. A. Cardenas, S. Amin, B. Sinopoli, A. Giani, A. Perrig, S. Sastry, Challenges for securing cyber physical systems, in Workshop on Future Directions in Cyber-Physical Systems Security, vol. 5, No. 1 (2009)