1. An overview of social engineering malware: Trends, tactics, and implications
2. Abrams, M., & Weiss, J. (2008). Malicious control system cyber security attack case study: Maroochy water services. Australia: National Institute of Standards and Technology. Retrieved from http://csrc.nist.gov/groups/SMA/fisma/ics/documents/Maroochy-Water-Services-Case-Study_report.pdf
3. Acharya, A. (2004). Defending Singapore’s vital infrastructure against terrorism. IDSS Commentaries. Retrieved from http://www.pvtr.org/pdf/commentaries/IDSS372004.pdf
4. Perception on Cyber Terrorism: A Focus Group Discussion Approach
5. Applegate, S. D. (2013). The dawn of kinetic cyber. In K. Podins, J. Stinissen, & M. Maybaum (Eds.), 5th international conference on cyber conflict. Estonia, Tallinn: NATO CCD COE Publication.