1. Goetz E, Shenoi S (2008) Critical infrastructure protection. Springer, New York
2. Krutz R (2006) Securing SCADA systems. Wiley Publishing, Indianapolis
3. Nickolov E (2005) Critical information infrastructure protection: analysis, evaluation and expectations. Int J Inform Secur 17:105–119
4. Shea D (2004) Critical infrastructure: control systems and the terrorist threat. Congressional Research Service, Washington
5. U.S. General Accounting Office (2004) Cybersecurity for critical infrastructure protection. Washington: GAO-04-321