1. A survey of network anomaly detection techniques;Ahmed;Journal of Network and Computer Applications,2016
2. Protecting critical National Infrastructures: An overview of cyberattacks and countermeasures;Aljundi,2023
3. Reachability analysis and its application to the safety assessment of autonomous cars;Althoff,2010
4. Cybersecurity in industrial control systems: Issues, technologies, and challenges;Asghar;Computer Networks,2019
5. A game theoretic approach to model cyber-attack and defense strategies;Attiah,2018