1. Arnold, Ch., Butts, J., Thirunarayan, K. (2014). Detecting Integrity Attacks on Industrial Control systems. w : J. Butts, S. Shenoi (red.), Critical Infrastructure Protection VIII, Springer. Dostęp 20.05.2023 r. z https://www.researchgate.net/publication/309665457_Critical_Infrastructure_Protection_VIII_8th_IFIPWG1110_International_Conference_ICCIP_2014_Arlington_VA_USA_March_17-19_2014.
2. Baina, A. (2009). Contrôle d’Accès pour les Grandes Infrastructures Critiques: Application au réseau d’énergie électrique, Institut National des Sciences Appliquées de Toulouse, 29 septembre, Toulouse. Dostęp 12.05.2023 r. z https://theses.hal.science/tel-00432841/file/these_amine_baina_2009_CNRS.pdf.
3. Beneš, J. (1979). Teoria systemów, PWN.
4. Cavallini, S., d’Alessandro, C., Volpe, M., Armenia, S., Corlini, C., Brein, E., Assogna, P. (2014). A system Dynamics Framework for Modeling Critical Infrastructure Resilience. w: J. Butts, S. Shenoi (red.), Critical Infrastructure Protection VIII, Springer. Dostęp 20.05.2023 r. z https://link.springer.com/chapter/10.1007/978-3-662-45355-1_10.