1. Kordy, B., Piètre-Cambacédès, L., Schweitzer, P.: DAG-based attack and defense modeling: don’t miss the forest for the attack trees. Comput. Sci. Rev. 13–14, 1–38 (2014). https://doi.org/10.1016/j.cosrev.2014.07.001
2. Acunetix: (2008) http://www.acunetix.com/vulnerability-scanner/
3. Deraison, R.: Nessus (1999). https://www.tenable.com/products/nessus
4. BS ISO/IEC 27001: Information technology–security techniques–information security management systems–requirements (2013)
5. Cerotti, D., Raiteri, D.C., Dondossola, G., Egidi, L., Franceschinis, G., Portinale, L., Terruggia, R.: A Bayesian network approach for the interpretation of cyber attacks to power systems. In: ITASEC (2019)