1. A. Nicholson, S. Webber, S. Dyer, T. Patel, H. Janicke, Scada security in the light of cyber-warfare, Computers & Securityvol. 31(4) (2012) pp. 418–436.
2. N. Falliere, L. Murchu, E. Chien, W32.Stuxnet Dossier, Symantec Security Response(2012).
3. S. Zhioua, The middle east under malware attack: Dissecting cyber weapons, Proceedings of the IEEE ICDCS Workshop on Network Forensics, Security and Privacy (NFSP) (2013).
4. D. Beresford, Exploiting Siemens Simatic S7 PLC, Black HatUSA (2011).
5. P. Huitsing, R. Chandia, M. Papa, S. Sheno, Attack taxonomies for the Modbus protocol, International Journal of Critical Infrastructure Protection 1(0) (2008) 37–44.