1. D Corman, V Pillitteri, S Tousley, M Tehranipoor, U Lindqvist, NITRD Cyber-Physical Security Panel 35th IEEE Symposium on Security and Privacy (IEEE S&P, San Jose, CA, 2014).
2. N Falliere, LO Murchu, E Chien, W32. stuxnet dossier. White paper, Symantec Corp., Secur. Response. 5:, 6 (2011).
3. J Rubio-Hernan, L De Cicco, J Garcia-Alfaro, in 11th International Conference on Availability, Reliability and Security. Revisiting a watermark-based detection scheme to handle cyber-physical attacks (IEEE Salzburg, 2016).
4. Y Mo, B Sinopoli, in Communication, Control, and Computing. 47th Annual Allerton Conference On. Secure control against replay attacks (IEEE, 2009), pp. 911–918. doi: 10.1109/ALLERTON.2009.5394956 .
5. Y Mo, S Weerakkody, B Sinopoli, Physical authentication of control systems: designing watermarked control inputs to detect counterfeit sensor outputs. IEEE Control Syst. 35(1), 93–109 (2015). doi: 10.1109/MCS.2014.2364724 .