1. J. Von Neumann, The First Draft Report on the EDVAC (United States Army Ordnance Department and the University of Pennsylvania, PA, 1945)
2. R. Trost, Practical Intrusion Analysis. Prevention and Detection for the Twenty-First Century. (Addison Wesley, 2010)
3. J. Andress, S. Winterfeld, Cyber Warfare: Techniques Tactics and Tools for Security Practitioners (Syngress, Amsterdam, 2011)
4. S. Cheung, U. Lindqvist, M.W. Fong, Modeling Multistep Cyber Attacks for Scenario Recognition, in Proceedings Third DARPA Information Survivability Conference and Exposition, vol. 1 Washington, DC, 2003, pp. 284–292
5. C. Tranchita, N. Hadjsaid, M. Visiteu, B. Rosel, R. Caire, ICT and power systems: An integrated approach. eds. by S. Lukszo, G. Deconinck, M.P.C. Wejnen, Securing Electricity Supply in the Cyber Age. Springer, 2010.