1. Albright, D., Brannan, P. & Christina, W., 2010. Did Stuxnet Take Out 1,000 Centrifuges at the Natanz Enrichment Plant? [Online] Institute for Science and International Security (ISIS) Available at: HYPERLINK “file:///C:\\Users\\zachd1\\Dropbox\\DoD_MRL\\NAMRC%2044\\isis-online.org\\isis-reports\\detail\\did-stuxnet-take-out-1000-centrifuges-at-the-natanz-enrichment-plant\\” isis-online.org/isis-reports/detail/did-stuxnet-take-out-1000-centrifuges-at-the-natanz-enrichment-plant/[Accessed 14 December 2014].
2. Anthem, Inc., 2015. How to Access & Sign Up For Identity Theft Repair & Credit Monitoring Services. [Online] Available at: HYPERLINK “file:///C:\\Users\\zachd1\\Dropbox\\DoD_MRL\\NAMRC%2044\\www.anthemfacts.com” www.anthemfacts.com [Accessed 28 October 2015].
3. Baker, G.H., 2005. A Vulnerability Assessment Methodology for Critical Infrastructure Sites. In DHS Symposium. Boston, Massachusetts, 2005. Department of Homeland Security.
4. Bergvall, J. & Svensson, L., 2012. Risk Analysis Review. Master's Thesis. Linköping, Sweden: Linköpings University.
5. Caralli, R.A., Stevens, J.F., Young, L.R. & Wilson, W.R., 2007. The OCTAVE Allegro Guidebook, v1.0. Software Engineering Institute.