1. 2022. INCONTROLLER: New State-Sponsored Cyber Attack Tools Target Multiple Industrial Control Systems. (2022). https://www.mandiant.com/resources/blog/incontroller-state-sponsored-ics-tool. 2022. INCONTROLLER: New State-Sponsored Cyber Attack Tools Target Multiple Industrial Control Systems. (2022). https://www.mandiant.com/resources/blog/incontroller-state-sponsored-ics-tool.
2. 2023. UDS ISO 14229:Standardized CAN-based protocol for diagnostics. ( 2023 ). [Online] . 2023. UDS ISO 14229:Standardized CAN-based protocol for diagnostics. (2023). [Online].
3. Kelly Jackson Higgins . 2019. Triton/ Trisis Attacks Another Victim . ( 2019 ). https://www.darkreading.com/vulnerabilities-threats/triton-trisis-attacks-another-victim . Kelly Jackson Higgins. 2019. Triton/Trisis Attacks Another Victim. (2019). https://www.darkreading.com/vulnerabilities-threats/triton-trisis-attacks-another-victim.
4. Michael B Kelley . 2013. The Stuxnet Attack On Iran’s Nuclear Plant Was ’Far More Dangerous ’ Than Previously Thought. ( 2013 ). https://www.businessinsider.com/stuxnet-was-far-more-dangerous-than-previous-thought-2013-11. Michael B Kelley. 2013. The Stuxnet Attack On Iran’s Nuclear Plant Was ’Far More Dangerous’ Than Previously Thought. (2013). https://www.businessinsider.com/stuxnet-was-far-more-dangerous-than-previous-thought-2013-11.
5. ISO 14230-3. 1999. Keyword Protocol 2000 Part 3. (1999). https://www.sis.se/api/document/preview/895162/. ISO 14230-3. 1999. Keyword Protocol 2000 Part 3. (1999). https://www.sis.se/api/document/preview/895162/.