1. Monowar Hasan, Sibin Mohan, Rakesh B. Bobba, and Rodolfo Pellizzoni. 2016. Exploring opportunistic execution for integrating security into legacy hard real-time systems. In IEEE RTSS. 123–134.
2. Malicious control system cyber security attack case study—Maroochy Water Services, Australia;Abrams Marshall;The MITRE Corporation, McLean, VA.,2008
3. Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl Koscher, Alexei Czeskis, Franziska Roesner, Tadayoshi Kohno, et al. 2011. Comprehensive experimental analyses of automotive attack surfaces. In USENIX Security Symposium.
4. Karl Koscher, Alexei Czeskis, Franziska Roesner, Shwetak Patel, Tadayoshi Kohno, Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, et al. 2010. Experimental security analysis of a modern automobile. In IEEE S&P. 447–462.
5. Shane S. Clark and Kevin Fu. 2011. Recent results in computer security for medical devices. In MobiHealth. 111–118.