1. Dotfuscator Community 6.3. 2011. PreEmptive Protection. https://www.preemptive.com/dotfuscator/ce/docs/help/obfuscation_renaming.html. Dotfuscator Community 6.3. 2011. PreEmptive Protection. https://www.preemptive.com/dotfuscator/ce/docs/help/obfuscation_renaming.html.
2. Wolfgang Altmann . 2005. Practical process control for engineers and technicians . Elsevier . Wolfgang Altmann. 2005. Practical process control for engineers and technicians. Elsevier.
3. Michael J Assante and Robert M Lee . 2015. The industrial control system cyber kill chain . SANS Institute InfoSec Reading Room 1 ( 2015 ). Michael J Assante and Robert M Lee. 2015. The industrial control system cyber kill chain. SANS Institute InfoSec Reading Room 1 (2015).
4. Baesystems. 2022. Havex. https://www.baesystems.com/en/cybersecurity/feature/havex. Baesystems. 2022. Havex. https://www.baesystems.com/en/cybersecurity/feature/havex.
5. Shalini Banerjee Steven D. Galbraith and Giovanni Russello. 2023. Obfuscating Decision Trees. Cryptology ePrint Archive Paper 2023/068. https://eprint.iacr.org/2023/068 https://eprint.iacr.org/2023/068. Shalini Banerjee Steven D. Galbraith and Giovanni Russello. 2023. Obfuscating Decision Trees. Cryptology ePrint Archive Paper 2023/068. https://eprint.iacr.org/2023/068 https://eprint.iacr.org/2023/068.