1. D. Parsons, “The state of ICS/OT cybersecurity in 2022 and beyond,” Tech. Rep., SANS, 2022.
2. J. L. Rrushi, H. Farhangi, C. Howey, K. Carmichael, and J. Dabell, “A quantitative evaluation of the target selection of havex ICS malware plugin,” in Industrial Control System Security (ICSS) Workshop, 2015.
3. J. Slowik, Anatomy of an attack: detecting and defeating CRASHOVERRIDE, Montreal, Quebec, Canada, Virusbulletin, 2018. Available at: https://www.dragos.com/resource/anatomy-of-an-attack-detecting-and-defeating-crashoverride/.
4. Dragos, TRISIS Malware: Analysis of Safety System Targeted Malware, Version 1.20171213, 2017, Dragos Inc., Available at: https://www.dragos.com/wp-content/uploads/TRISIS-01.pdf.
5. J. Friedman and M. Bouchard, Definitive Guide to Cyber Threat Intelligence, Annapolis, MD, CyberEdge Group, LLC, 2015.