1. Alert, D (2016) Cyber-Attack Against Ukrainian Critical Infrastructure. February.
2. Ali, A, Zhiyuan S, Antonios G, Syed AAN, Paolo G, Massimiliano T (2017) HyRiM Deliverable 4.3: How to Enhance Perimeter Security Using New Surveillance Technologies. https://hyrim.net/wp-content/uploads/2017/12/HyRiM-D4.3-How-to-Enhance-Perimeter-Security-using-new-Surveillance-Technologies.pdf . Accessed Feb 2018.
3. Alshawish, A, Amine Abid M, de Meer H, Schauer S, König S, Gouglidis A, Hutchison D (2018) G-DPS: A game-theoretical decision-making framework for physical surveillance games In: Game Theory for Security and Risk Management: From Theory to Practice. Static & Dynamic Game Theory: Foundations and Applications.. Springer Birkhäuser, Basel. ISBN 9783319752679.
4. Amin, M (2002) Security challenges for the electricity infrastructure. Computer 35(4):8–10.
5. Antonello, R, Fernandes S, Kamienski C, Sadok D, Kelner J, GóDor I, Szabó G, Westholm T (2012) Deep packet inspection tools and techniques in commodity platforms: Challenges and trends. J Netw Comput Appl 35(6):1863–1878.