1. Abrams M, Weiss J (2008) Malicious control system cyber security attack case study: Maroochy water services, Australia.
https://www.mitre.org/sites/default/files/pdf/08_1145.pdf
. Accessed 29 Jan 2018
2. Angelini M, Lenti S, Santucci G (2017) Crumbs: a cyber security framework browser. In: 2017 IEEE Symposium on Visualization for Cyber Security (VizSec). IEEE, pp 1–8
3. BSI Group (2011) Case study Thames Security Shredding (TSS) Ltd.
https://www.bsigroup.com/Documents/iso-27001/case-studies/BSI-ISO-IEC-27001-case-study-Thames-Security-UK-EN.pdf?epslanguage=en-MY
. Accessed 15 Feb 2018
4. BSI Group (2012) How Fredrickson has reduced third party scrutiny and protected its reputation with ISO 27001 certification.
https://www.bsigroup.com/Documents/iso-27001/case-studies/BSI-ISO-IEC-27001-case-study-Fredrickson-International-EN-UK.pdf?epslanguage=en-MY
. Accessed 15 Feb 2018
5. BSI Group (2013) Implementing best practice and improving client confidence with ISO/IEC 27001.
https://www.bsigroup.com/Documents/iso-27001/case-studies/BSI-ISO-IEC-27001-case-study-Legal-Ombudsman-UK-EN.pdf
. Accessed 15 Feb 2018