1. C. Barreto, A. Cardenas and N. Quijano, Controllability of dynamical systems: Threat models and reactive security, Proceedings of the Fourth International Conference on Decision and Game Theory for Security, pp. 45–64, 2013.
2. A. Cardenas, S. Amin and S. Sastry, Secure control: Towards survivable cyber-physical systems, Proceedings of the Twenty-Eighth International Conference on Distributed Computing Systems Workshops, pp. 495–500, 2008.
3. S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, S. Savage, K. Koscher, A. Czeskis, F. Roesner and K. Tadayoshi, Comprehensive experimental analyses of automotive attack surfaces, Proceedings of the Twentieth USENIX Conference on Security, 2011.
4. N. Falliere, L. O׳Murchu and E. Chien, W32.Stuxnet Dossier, version 1.4, Symantec, Mountain View, California, 2010.
5. P. Feiler, SAE AADL V2: An Overview, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, Pennsylvania, 2010.