1. Zetter, Kim, A Cyberattack Has Caused Confirmed Physical Damage for the Second Time Ever, Wired Online, 8 January 2015. http://www.wired.com/2015/01/german-steel-mill-hack-destruction.
2. Baybutt, P., An Asset-Based Approach for Industrial Cyber Security Vulnerability Analysis, Process Safety Progress, Vol. 22, No. 4, pages 220-292, 2003.
3. Sarwate, A., 2015 Industrial Control System Vulnerability Trends, Presentation at RSA Conference 2015, Session SEC-F04, July 2015.
4. Sparks, S., Embleton, S., Cunningham, R. and Zou, C., Automated Vulnerability Analysis: Leveraging Control Flow for Evolutionary Input Crafting, Proceedings of the IEEE 23rd Annual Computer Security Applications Conference, pages 477-486, 2007.
5. Kimball, W., A Formal Approach to Vulnerability Discovery in Binary Programs, PhD Dissertation, Air Force Institute of Technology, 2013. AFIT -ENG-DS-13-J-03.