1. Yan, W., Mestha, L.K., Abbaszadeh, M.: Attack detection for securing cyber physical systems. IEEE Internet Things J. 6(5), 8471–8481 (2019)
2. Weinberger, S.: Top ten most-destructive computer viruses, 19 2012 (2012).
Smithsonian.com
3. Cybersecurity Unit, Computer Crime & Intellectual Property Section Criminal Division U.S. Department of Justice. A framework for a vulnerability disclosure program for online systems.
https://www.justice.gov/criminal-ccips/page/file/983996/download
. Accessed 21 May 2019
4. Guan, J., Zhang, Y., Yao, S., Wang, L.: AID shuffling mechanism based on group-buying auction for identifier network security. IEEE Access 7, 123746–123756 (2019)
5. Lipner, S.B.: The birth and death of the orange book. IEEE Ann. Hist. Comput. 37(2), 19–31 (2015)