1. Allemang, D. H. (2011). Semantic web for the working ontologist: Effective modeling in RDFS and OWL. Amsterdam: Elsevier.
2. Bishop, M. (1995). CSE-95-10 A taxonomy of unix system and network vulnerabilities. Davis: Department of Computer Science, University of California at Davis.
3. Brewster, T. (2014, July 13). US energy firms report cyber attacks. Retrieved from Tech Week Europe: http://www.techweekeurope.co.uk/workspace/energy-firms-cyber-incidents-dragonfly-energetic-bear-148457 .
4. Choraś, M.F. (2009). Decision aid tool and ontology-based reasoning for critical infrastructure vulnerabilities and threat analysis. In E.R. Bloomfield (Ed.), CRITIS (Vol. 6027, pp. 98–110). Berlin: Springer-Verlag.
5. Clayton, M. (2011, November 18). Cyberattack on Illinois water utility may confirm Stuxnet warnings. Christian Monitor. http://www.csmonitor.com/USA/2011/1118/Cyberattack-on-Illinois-water-utility-may-confirm-Stuxnet-warnings .