1. Stuxnet: Dissecting a cyberwarfare weapon;Langner;IEEE Secur. Priv.,2011
2. B. Bencsáth, G. Pék, L. Buttyán, M. Félegyházi, Duqu: Analysis, detection, and lessons learned, in: ACM European Workshop on System Security, Vol. 2012, EuroSec, 2012.
3. Taxonomical challenges for cyber incident response threat intelligence: A review;Ammi;Int. J. Cloud Appl. Comput. (IJCAC),2022
4. Computing the impact of cyber attacks on complex missions;Musman,2011
5. A systems engineering approach for crown jewels estimation and mission assurance decision making;Musman,2011