1. Akella, R., Tang, H., & McMillin, B. M. (2010). Analysis of information flow security in cyber–physical systems. International Journal of Critical Infrastructure Protection, 3, 157–173.
2. Ali, S., & Anwar, R. W. (2012). Trust based secure cyber physical systems. In Workshop Proceedings: Trustworthy Cyber-Physical Systems, Computing Science, Newcastle University, 2012.
3. Ali, S., Anwar, R. W., & Hussain, O. K. (2015). Cyber security for cyber-physical systems: A trust based approach. Journal of Theoretical and Applied Information Technology, 71, 144–152.
4. Alippi, C. (2014). Intelligence for embedded systems. Springer.
5. Andersen, M. P., & Culler, D. E. (2014). System design trade-offs in a next-generation embedded wireless platform.