1. Falliere N, Murchu LO, Chien E (2011) W32.stuxnet dossier. Symantec. Technical report http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_stuxnet_dossier.pdf. Accessed 25 July 2019
2. Langner R (2011) Stuxnet: dissecting a cyberwarfare weapon. IEEE Secur Privacy 9(3):49–51
3. Nash T (2005) Backdoors and holes in network perimeters—a case study for improving your control system security, vol 1.1, August 2005, Vulnerability and risk assessment program, Lawrence Livermore National Laboratory, UCRL-MI-215398
4. Gostev A (2012) The flame: questions and answers. Securelist Blog, Kaspersky. https://www.securelist.com/en/blog/208193522/The_Flame_Questions_and_Answers. Accessed 25 July 2019
5. Lee RM, Assante MJ, Conway T (2016) Analysis of the cyber attack on the ukrainian power grid. Technical report, E-ISAC