1. Critical infrastructure protection: requirements for the 21st century;Alcaraz;International Journal of Critical Infrastructure Protection 8,2015
2. A, Antonopoulos. (2011, July 27). IT security's scariest acronym: BYOD, bring your own device. Network World. Retrieved from http://www.pcworld.com/article/236727/it_securitys_scariest_acronym_byod_bring_your_own_device.html
3. Risk-Based Methodology for Real-Time Security Monitoring of Interdependent Services in Critical Infrastructures;Aubert;Proceedings of International Conference on Availability Reliability and Security ARES,2010
4. Australian Government – Northern Territory (2009). Framework for the Protection of Northern Territory Critical Infrastructure. Northern Territory Government: Australia.
5. Australian Government – Queensland (2005). Queensland Infrastructure Protection and Resilience Framework. Queensland: Australia.