1. Alberts, D. S. (1996, April). Information age transformation, getting to a 21st century military, DOD Command and Control Research Program. [Online]. Available:
http://www.dtic.mil/get-trdoc/pdf?AD=ADA457904
2. Allan, B. A., Armstrong, R. C., Mayo, J. R., Pierson, L. G., Torgerson, M. D., & Walker, A. M. (2010, October). The theory of diversity and redundancy in information system security: LDRD final report. [Online]. Available:
http://prod.sandia.gov/techlib/access-control.cgi/2010/107055.pdf
3. Alves, J., Westphall, C. M., & Schmitt, G. R. (2016). A risk calculus extension to the XACML language. In XII Brazilian Symposium on Information Systems. Brazil: Florianópolis.
4. Assante, M. J., & Lee, R. M. (2015, October). The industrial control system cyber kill chain. SANS Institute Reading Room. [Online]. Available:
https://www.sans.org/reading-room/whitepapers/ICS/industrialcontrol-system-cyber-kill-chain-36297
5. Bank for International Settlements and International Organization of Securities Commissions. (2016, June). Guidance on cyber resilience for financial market infrastructures. [Online]. Available:
https://www.bis.org/cpmi/publ/d146.pdf