1. Stouffer, K., Falco, J., Kent, K.: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security. NIST, p. 164 (2006)
2. Bloomfield, R.E. et al.: Preliminary Interdependency Analysis (PIA): Method and tool support. Adelard LLP, p. 56 (2010)
3. Bloomfield, R.E. et al.: Stochastic modelling of the effects of dependencies between critical infrastructures. In: Critical Information Infrastructures Security: 4th International Workshop, CRITIS, 2010, Bonn. Springer, Germany (2009)
4. Ford, M.D., et al.: Implementing the ADVISE security modeling formalism in Mobius. In: The 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). Budapest, Hungary (2013)
5. Ten, C.-W., et al.: Vulnerability assessment of cybersecurity for SCADA systems. IEEE Trans. Power Syst. 23(4), 1836–1846 (2008)