1. Anand, M., Cronin, E., Sherr, M., Blaze, M., Ives, Z., & Lee, I. (2006). Security challenges in next generation cyber physical systems. In Beyond SCADA: Networked Embedded Control for Cyber Physical Systems. Pittsburgh, Pennsylvania, USA.
2. Cárdenas, A. A., Amin, S., Sinopoli, B., Giani, A., Perrig, A., & Sastry, S. (2009). Challenges for securing cyber physical systems. In: Workshop on future directions in cyber-physical systems security. Newark, NJ, USA.
3. Chandola, V., Banerjee, A., & Kumar, V. (2010). Anomaly detection for discrete sequences: A survey. IEEE Transactions on Knowledge and Data Engineering. doi: 10.1109/TKDE.2010.235 .
4. Chen, I. R., & Wang, D. C. (1996). Analyzing dynamic voting using petri nets. In: 15th IEEE symposium on reliable distributed systems. Niagara Falls, ON, Canada.
5. Cho J. H., Chen I. R. (2010) Modeling and analysis of intrusion detection integrated with batch rekeying for dynamic group communication systems in mobile ad hoc networks. Wireless Networks 16(4): 1157–1173