1. Augmenting attack graphs to represent data link and network layer vulnerabilities
2. Michael J. Assante and Robert M. Lee. 2015. The Industrial Control System Cyber Kill Chain . https://www.sans.org/reading-room/whitepapers/ICS/paper/36297 Michael J. Assante and Robert M. Lee. 2015. The Industrial Control System Cyber Kill Chain . https://www.sans.org/reading-room/whitepapers/ICS/paper/36297
3. The International Electrotechnical Commission. [n.d.]. IEC/TS 62443-1-1 Industrial communication networks – Network and system security. The International Electrotechnical Commission. [n.d.]. IEC/TS 62443-1-1 Industrial communication networks – Network and system security.
4. Cybersecurity and Infrastructure Security Agency (CISA). [n.d.]. Recommended Practices. https://www.us-cert.gov/ics/Recommended-Practices Cybersecurity and Infrastructure Security Agency (CISA). [n.d.]. Recommended Practices. https://www.us-cert.gov/ics/Recommended-Practices