1. An unsupervised anomaly-based detection approach for integrity attacks on SCADA systems;Almalawi;Comput Secur,2014
2. Designing user incentives for cybersecurity;August;Commun ACM,2014
3. Backhaus S., Bent R., Bono J., Lee R., Tracey B., Wolpert D., et al., Cyber-physical security: a game theory model of humans interacting over control systems. arXiv:1304.3996 [cs.GT].
4. The Nepenthes platform: an efficient approach to collect malware;Baecher;LNCS,2006