1. Abrams, M., & Weiss, J. (2008). Malicious control system cyber security attack case study—Maroochy water services Australia. Washington, DC: NIST. Retrieved November 8, 2015, from http://csrc.nist.gov/groups/SMA/fisma/ics/documents/Maroochy-Water-Services-Case-Study_report.pdf .
2. Anderson, R., & Moore, T. (2006). The economics of information security. Science, 314(5799), 610–613. doi: 10.1126/science.1130992 .
3. Averill, B., & Luiijf, E. A. (2010). Canvassing the cyber security landscape: Why Energy companies need to pay attention. Journal on Energy Security, May 18. Retrieved November 8, 2015, from http://www.ensec.org/index.php?view=article&id=243%3Acanvassing-the-cyber-security-landscapewhy-energy-companies-need-to-pay-attention .
4. National Transportation Safety Board. (2010). Collision of two Washington metropolitan area transit authority metrorail trains near Fort Totten station, Washington, D.C., June 22, 2009. Washington, DC: NTSB. Retrieved November 8, 2015, from http://www.ntsb.gov/investigations/AccidentReports/Reports/RAR1002.pdf .
5. BSI. (2014). Requirements for network-connected industrial components v1.1.. Bad Godesberg, Germany: BSI. Retrieved November 8, 2015, from https://www.allianz-fuer-cybersicherheit.de/ACS/DE/_downloads/techniker/hardware/BSI-CS_067E.pdf .