1. Lecture Notes in Computer Science;K.D. Bowers,2012
2. Department of Energy, “Control systems cyber security: defense in depth strategies,” External Report # INL/EXT-06-11478,
http://energy.gov/sites/prod/files/oeprod/DocumentsandMedia/Defense_in_Depth_Strategies.pdf
3. Zhu, Q., Başar, T.: A hierarchical security architecture for the smart grid. In: Hossain, E., Han, Z., Poor, H.V. (eds.) Smart Grid Communications and Networking, Cambridge University Press (2012)
4. Byres, E., Ginter, A., Langill, J.: “How Stuxnet spreads – A study of infection paths in best practice systems,” White Paper, Tofino Security (February 22, 2011)
5. Falliere, N., Murchu, L.O., Chien, E.: “W32. Stuxnet Dossier,” Symantec Reports (February 2011)