1. G. Bekey and C. Neal, Identification of sampling intervals in sampled-data models of human operators, IEEE Transactions on Man-Machine Systems, vol. 9(4), pp. 138–142, 1968.
2. LNCS;E. Bompard,2012
3. R. Chabukswar, B. Sinopoli, G. Karsai, A. Giani, H. Neema and A. Davis, Simulation of network attacks on SCADA systems, presented at the First Workshop on Secure Control Systems, 2010.
4. K. Craik, Theory of the human operator in control systems, British Journal of Psychology, vol. 38(2), pp. 56–61, 1947.
5. C. Davis, J. Tate, H. Okhravi, C. Grier, T. Overbye and D. Nicol, SCADA cyber security testbed development, Proceedings of the Thirty-Eighth North American Power Symposium, pp. 483–488, 2006.