1. K. Andersson, Cybersecurity: Public Sector Threats and Responses (CRC, Boca Raton, FL, 2012).
2. Critical Infrastructure Protection II, Ed. by M. Papa and S. Shenoi (Springer-Verlag, New York, 2012).
3. Y. S. Vasiliev, P. D. Zegzhda, and V. I. Kuvshinov, “Modern problems of cybersecurity,” Nonlinear Phenom. Complex Syst. (Minsk, Belarus) 17 (3), 210–214 (2014). http://www.j-npcs.org/online/vol2014/v17no3p210.pdf.
4. R. Axelrod and R. Iliev, “Timing of cyber conflict,” Proc. Natl. Acad. Sci. U. S. A. 111 (4), 1298–1303 (2014). www.pnas.org/cgi/doi/10.1073/pnas.1322638111.
5. K. Stouffer, V. Pillitteri, S. Lightman, M. Abrams, and A. Hahn, “Guide to industrial control systems (ICS) security. Revision 2,” (Available from National Institute of Standards and Technology, Special Publication 800-82 Revision 2, 2015). http://dx.doi.org/. doi 10.6028/NIST.SP.800-82r2