1. Ottis R (2008) Analysis of the 2007 cyber attacks against Estonia from the information warfare perspective. In: Proceedings of the 7th European conference on information warfare
2. European Data Protection Supervisor (2013) Cyber security strategy of the European union: an open, safe and secure cyberspace (Online). Available: https://edps.europa.eu/sites/default/files/publication/13-06-14_cyber_security_en.pdf
3. The European Parliament and the Council of the European Union (2016) Directive (EU) 2016/1148 of the European parliament and of the council of 6 July 2016 concerning measures for a high common level of security of network and information systems across the Union. Official J Euro Union
4. Burt T (2022) Nation-state cyberattacks become more brazen as authoritarian leaders ramp up aggression. Microsoft. (Online). Available: https://blogs.microsoft.com/on-the-issues/2022/11/04/microsoft-digital-defense-report-2022-ukraine/
5. Taylor JM, Sharif HR (2017) Security challenges and methods for protecting critical infrastructure cyber-physical systems. In: 2017 International conference on selected topics in mobile and wireless networking (MoWNeT), pp 1–6