1. Abrams, M., & Weiss, J. (2008). Malicious control system cyber security attack case study—Maroochy Water Services, Australia. Tech. rep., The MITRE Corporation Applied Control Solutions.
2. Ahuja, R. K., Magnanti, T. L., & Orlin, J. B. (1999). Network flows—Theory, algorithms, and applications. Upper Saddle River: Prentice Hall.
3. Anwar, A., & Mahmood, A. N. (2014). Cyber security of smart grid infrastructure (pp. 449–472). Boca Raton: CRC Press.
4. Batty, M., Axhausen, K. W., Giannotti, F., Pozdnoukhov, A., Bazzani, A., Wachowicz, M., et al. (2012). Smart cities of the future. The European Physical Journal Special Topics, 214(1), 481–518.
https://doi.org/10.1140/epjst/e2012-01703-3
, URL
https://doi.org/10.1140/epjst/e2012-01703-3
.
5. Bundesnetzagentur. (2007). Report by the Federal Network Agency for electricity, gas, telecommunications, post and railways on the disturbance in the German and European power system on the 4th of November 2006. Tech. rep., Bundesnetzagentur.