1. Abrams, M., & Weiss, J. (2008, July 23). Malicious Control System Cyber Security Attack Case Study - Maroochy Water Services, Australia. National Institute of Standards and Technology. Retrieved 30 December 2010 from http://csrc.nist.gov/groups/SMA/fisma/ics/documents/Maroochy-Water-Services-Case-Study_report.pdf
2. Alberts, D. S., & Hayes, R. E. (2003). Power to the Edge: Command and Control in the Information Age. CCRP. Retrieved 18 June 2017 from http://www.dodccrp.org/files/Alberts_Power.pdf
3. Allison, P. R. (2016, July 15). What does a bomb disposal robot actually do? BBC. Retrieved 7 June 2017 from http://www.bbc.com/future/story/20160714-what-does-a-bomb-disposal-robot-actually-do
4. Anshul. (2017, June 14). This $5 Device Can Hack Password-Protected Computers In Just 30 Seconds. Hacking-News & Tutorials. Retrieved 13 June 2017 from http://hackingnewstutorials.com/this-5-device-can-hack-password/
5. Ashford, W. (2015, April 10). French TV5Monde network cyber-attack the latest in destructive trend in system intrusions. Computer Weekly. Retrieved 15 June 2017 from http://www.computerweekly.com/news/4500244107/French-TV5Monde-network-cyber-attack-the-latest-in-destructive-trend-in-system-intrusions