1. Abad , C. Taylor , J. Sengul , C. Yurcik , W. Zhou , Y. Rowe , K. 2003 Log correlation for intrusion detection: a proof of concept 255 264
2. Agosta , G. Pelosi , G. 2007 A domain specific language for cryptography 159 164
3. Alberts , C. Ellison , R.J. Woody , C. 2009 Cyber Assurance http://resources.sei.cmu.edu/library/asset-view.cfm?assetid=77638
4. Subversion as a threat in information warfare;Anderson;Journal of Information Warfare,2004
5. Ansilla , J.D. Vasudevan , N. JayachandraBensam , J. Anunciya , J.D. 2015 Data security in smart grid with hardware implementation against DoS attacks 1 7