1. Abrams, M., & Weiss, J. (2008). Malicious Control System Cyber Security Attack Case Study–Maroochy Water Services, Australia. Retrieved from http://csrc.nist.gov/groups/SMA/fisma/ics/documents/Maroochy-Water-Services-Case-Study_report.pdf
2. Basic concepts and taxonomy of dependable and secure computing
3. Challenges for Securing Cyber Physical Systems;A.Cardenas;Workshop on Future Directions in Cyber-physical Systems Security
4. Cardenas, Amin, Sinopoli, Giani, Perrig, & Sastry. (2009). Challenges for Securing Cyber Physical Systems. Retrieved from http://cimic.rutgers.edu/positionPapers/cps-security-challenges-Cardenas.pdf