1. Industrial Internet Consortium (2015) Industrial Internet Reference Architecture, p 100, version 1.7. [Online]. Available: http://www.iiconsortium.org/IIRA-1-7-ajs.pdf
2. Sadeghi AR, Wachsmann C, Waidner M (2015) Security and Privacy Challenges in Industrial Internet of Things, San Francisco, June 2015, pp. 1–6, ID: doc:58de387be4b0cc37dc282eef. [Online]. Available: http://ieeexplore.ieee.org/document/7167238/
3. Gollmann D, Krotofil M (2016) Cyber physical system security, 1st edn, ser. The new codebreakers. Springer, Berlin/Heidelberg, pp 195–204, presentation. [Online]. Available: https://link.springer.com/chapter/10.1007/978-3-662-49301-4_14
4. Industrial Internet Consortium (2016) Industrial Internet Security Framework Volume G4, p 173, volume G4. [Online]. Available: http://www.iiconsortium.org/pdf/IIC_PUB_G4_V1.00_PB-3.pdf
5. Hanna S, Kumar S, Weber D (2018) IIC endpoint security best practices, Mar 2018. [Online]. Available: https://www.iiconsortium.org/pdf/Endpoint_Security_Best_Practices_Final_Mar_2018.pdf