M. Abrams and J. Weiss, Malicious control system cyber security attack case studymaroochy water services

B. Miller and D. Rowe, A survey SCADA of and critical infrastructure incidents, Proceedings of the 1st Annual conference on Research in information technology, RIIT '12, 2012.
DOI : 10.1145/2380790.2380805

. Nicholson, SCADA security in the light of cyber-warfare. Computers & Security, 2012. 4. http://www.waterfall-security.com/cyber-incident-blamed-for-nuclear-power-plant- shutdown-june-08

S. Luders, Stuxnet and the impact on accelerator control systems, Proc. Of the 13th Conference on Accelerator and Large Experimental Physics Control Systems, pp.1285-1288, 2011.

R. Farwell, Stuxnet and the futher of cyber war. Survival: global politics and strategy, 2011.

R. Rajkumar, L. Insup, and S. Lui, Cyber-physical systems, Proceedings of the 47th Design Automation Conference on, DAC '10, pp.731-736, 2010.
DOI : 10.1145/1837274.1837461

I. Security-compliance-institute, ISASecure Embedded Device Security Assurance Certi- fication, http://www.isa.org/filestore/asci/isci/ISCI%20ISASecure%20ECSA%20Certification%20br ochure.pdf 15. Wurldtech Security Inc. Achilles practices certification Evaluation criteria for IT security, 2005.

W. Zhongjie and . Xie-lulu, Cyber-physical systems: a survey, ACTA AUTOMATICA SINICA, vol.37, issue.10, pp.1157-1166, 2011.