C. Beggs, Cyber-terrorism : a threat to Australia? Managing Modern Organisation with Information Technology-Information Resources Management Association (IRMA), Idea Group Publishing, pp.472-475, 2005.

C. Beggs and M. Warren, Safeguarding Australia from Cyber-terrorism : A Proposed Cyberterrorism SCADA Risk Framework for Industry Adoption Keywords, Proc. 10th Aust. Inf. Warf. Secur. Conf. Ed. Cowan Univ. Perth West. Aust, pp.369-384, 2009.

J. Brömmelhörster, Critical Infrastructure Protection : Survey of World-Wide Activities, 2004.

M. M. Combs, Impact of the Stuxnet Virus On Industrial Control System. XIII International forumModern information society formationproblems, perspectives, innovation approaches, pp.5-10, 2011.

R. Dawson, SKMA ? A Key Management Architecture for SCADA Systems Proceedings of the 2006 Australasian workshops on Grid computing and e-research, pp.183-192, 2006.

T. Espiner, McAfee: Why Duqu is a big deal

J. J. Farris and D. M. Nicol, Evaluation of Secure Peer-to-Peer Overlay Routing for Survivable SCADA Systems, Proceedings of the 2004 Winter Simulation Conference, 2004., pp.300-308, 2004.
DOI : 10.1109/WSC.2004.1371330

J. P. Farwell and R. Rohozinski, Stuxnet and the Future of Cyber War, Survival, vol.53, issue.1, pp.23-40, 2011.
DOI : 10.1080/00396338.2011.555586

E. B. Fernandez, On building secure SCADA systems using security patterns Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research Cyber Security and Information Intelligence Challenges and Strategies -CSIIRW '09, p.17, 2009.

J. D. Fernandez and A. E. Fernandez, Scada systems: vulnerabilities and remediation, J. Comput. Sci. Coll, vol.20, issue.4, pp.160-168, 2005.

A. Hahn, Development of the PowerCyber SCADA Security Testbed [ Extended Abstract, Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research, pp.1-4, 2010.

. Lab, Gauss: Abnormal Distribution

D. Kilman and J. Stamp, Framework for SCADA Security Policy, 2005.

S. Melito, Software and Cold War: The Siberian Pipeline Explosion, http://defsecnet.com/software-and-cold-war-the-siberian-pipeline-explosion

B. Miller and D. Rowe, A Survey of SCADA and Critical Infrastructure Incidents Proceedings of the 1st Annual conference on Research in information technology -RIIT '12, p.51, 2012.

. Nicholson, SCADA security in the light of Cyber-Warfare, Computers & Security, vol.31, issue.4, pp.418-436, 2012.
DOI : 10.1016/j.cose.2012.02.009

M. Prigg, The hunt for Red October, http://www.dailymail.co.uk/sciencetech/article- 2263322/Operation-Red-October-revealed-The-astonishing-hacker-attack-infiltrated-55- 000-high-level-government-computers

C. Ten, Cybersecurity for Critical Infrastructures: Attack and Defense Modeling, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans, vol.40, issue.4, pp.853-865, 2010.
DOI : 10.1109/TSMCA.2010.2048028

R. Tsang, Cyberthreats, Vulnerabilities, and Attacks of SCADA Networks

J. White, 12 Steps toward Cyber Resilience, https://www.isc2.org/infosecurity- professional-insights.aspx. 27. Yaron, O.: Flame virus had massive impact on Iran

Z. Yunos, Safeguarding Malaysia's critical national information infrastructure (CNII) against cyber terrorism: Towards development of a policy framework, 2010 Sixth International Conference on Information Assurance and Security, pp.21-27, 2010.
DOI : 10.1109/ISIAS.2010.5604182

B. Zhu, A Taxonomy of Cyber Attacks on SCADA Systems, 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing, pp.380-388, 2011.
DOI : 10.1109/iThings/CPSCom.2011.34