1. M. di Bernardo, A. Salvi, S. Santini, Distributed consensus strategy for platooning of vehicles in the presence of time-varying heterogeneous communication delays. IEEE Trans. Intell. Transp. Syst. 16(1), 102–112 (2015)
2. R. Poovendran, K. Sampigethaya, S.K.S. Gupta, I. Lee, K.V. Prasad, D. Corman, J.L. Paunicka, Special issue on cyber-physical systems. Proc. IEEE 100(1), 6–12 (2012)
3. J. Slay, M. Miller, Lessons learned from the Maroochy water breach, in International Conference on Critical Infrastructure Protection (Springer, Berlin, 2007), pp. 73–82
4. J.P. Farwell, R. Rohozinski, Stuxnet and the future of cyber war. Survival 53(1), 23–40 (2011)
5. A.A. Cárdenas, S. Amin, Z.-S. Lin, Y.-L. Huang, C.-Y. Huang, S. Sastry, Attacks against process control systems: risk assessment, detection, and response, in Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ACM, New York, 2011), pp. 355–366