1. Byres, E.: The air gap: SCADA's enduring security myth: Attempting to use isolation as a security strategy for critical systems is unrealistic in an increasingly connected world, Communications of the ACM, Vol. 56, Issue 8, pp. 29-31, 2013.;
2. Luiijf, E.: Cyber (in-) security of industrial control systems: A societal challenge in International Conference on Computer Safety, Reliability, and Security, 23-25.09.2015, Delft, pp. 7-15.;
3. Falliere, N., Murchu, L.. O., Chien, E.: W32.stuxnet Dossier, White paper, Symantec Corp., Security Response, T. 5, No. 6, 2011.;
4. Lee, R. M., Assante, M. J., Conway, T.: German steel mill cyber attack, Industrial Control Systems, Vol.30, 2014.;
5. Lee, R. M. et al.: Analysis of the cyber attack on the Ukrainian power grid, Electricity Information Sharing and Analysis Center, 2016.;