1. How “omnipotent” hackers tied to NSA hid for 14 years—and were found at last;Goodin,2015
2. Stuxnet worm impact on industrial cyber-physical system security;Karnouskos,2011
3. Knowlton B. Military Computer Attack Confirmed, 2010. [Online]. Available: http://www.nytimes.com/2010/08/26/technology/26cyber.html?_r=2&adxnnl=1&ref=technology&adxnnlx=1423562532-hJL+Kot1FP3OEURLF9hjDw.
4. ICS-CERT, Malware infections in the conrol environment, 2012.
5. Stasiukonis S. Social-engineering-the-usb-way, 2006. [Online]. Available: http://www.darkreading.com/attacks-breaches/social-engineering-the-usb-way/d/d-id/1128081?.