1. [1] Li, S., Xu, L.D. and Zhao, S.: 5g internet of things: A survey, Journal of Industrial Information Integration, Vol.10, pp.1-9 (2018) (online), available from <http://www.sciencedirect.com/science/article/pii/S2452414X18300037>.
2. [2] Zimba, A., Wang, Z. and Chen, H.: Multi-stage crypto ransomware attacks: A new emerging cyber threat to critical infrastructure and industrial control systems, ICT Express, Vol.4, No.1, pp.14-18 (2018).
3. [3] Angrishi, K.: Turning internet of things(iot) into internet of vulnerabilities (iov): Iot botnets, CoRR, Vol.abs/1702.03681 (2017) (online), available from <http://arxiv.org/abs/1702.03681>.
4. [4] Falliere, N., Murchu, L.O. and Chien, E.: W32.stuxnet dossier (2010) (online), available from <https://www.wired.com/images_blogs/threatlevel/2010/11/w32_stuxnet_dossier.pdf> (accessed 2018-11-13).
5. [5] Yadav, G. and Paul, K.: Assessment of scada system vulnerabilities, 2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), pp.1737-1744 (2019).