1. Abrams, M., & Weiss, J. (2007, September). Bellingham, Washington, control system cyber security case study. National Institute of Standards and Technology (NIST). Retrieved from http://csrc.nist.gov/groups/SMA/fisma/ics/documents/Bellingham_Case_Study_report%2020Sep071.pdf .
2. Abrams, M., & Weiss, J. (2008). Malicious control system cyber security attack case study–Maroochy water services. Australia: National Institute of Standards and Technology (NIST). Retrieved from http://csrc.nist.gov/groups/SMA/fisma/ics/documents/Maroochy-Water-Services-Case-Study_report.pdf .
3. American Gas Association (AGA). (2006, March 14). Report No. 12. Cryptographic protection of SCADA communications part 1: Background, policies and test plan.
4. Barnes, R., Thomson, M., Pironti, A., Langley, A. (2015, June). Deprecating secure sockets layer version 3.0. Internet Engineering Task Force (IETF). Retrieved from https://tools.ietf.org/html/rfc7568 .
5. Bradley, I., Ciufo, J., Cooperberg, A., Tavener, C. (2007, June). Life-cycle management for system protection. Transmission & Distribution World Magazine.