E. Byres, J. Lowe, The myths and facts behind cyber security risks for industrial control systems, in: Proc. of the VDE Kongress, vol. 116, 2004, pp. 213-218.
 L. Obregon, Secure architecture for industrial control systems, SANS Institute InfoSec Reading Room, 2015.
 E.D. Knapp, J.T. Langill, Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems, Syngress, 2014.
 H. Ghani, A. Khelil, N. Suri, G. Csertán, L. Gönczy, G. Urbanics, J. Clarke, Assessing the security of internet-connected critical infrastructures, Secur. Commun. Netw. 7 (12) (2014) 2713-2725.
 S. Marrone, Towards a unified definition of cyber and physical vulnerability in critical infrastructures, in: Security and Privacy Workshops (EuroS&PW), 2017 IEEE European Symposium on, IEEE, 2017, pp. 167- 173.
 K. Ganame, M.A. Allaire, G. Zagdene, O. Boudar, Network behavioral analysis for zero-day malware detection-A case study, in: International Conference on Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments, Springer, Cham, 2017, pp. 169-181.
 D. Gonzales, J.M. Kaplan, E. Saltzman, Z. Winkelman, D. Woods, Cloudtrust-A security assessment model for infrastructure as a service (IaaS) clouds, IEEE Trans. Cloud Comput. 5 (3) (2017) 523-536.
 R. Brewer, Ransomware attacks: detection, prevention and cure, Netw. Secur. 2016 (9) (2016) 5-9.
 G. Swenson, Bolstering Government Cybersecurity Lessons Learned from WannaCry, NIST, 2017.
 S. Lüders, Why Control System Cyber-Security, BlackHat Conference, August 2014. [Online] Available: https://www.blackhat.com/docs/us-14/ materials/us-14-Luders-Why-Control-System-Cyber-Security-Sucks.pdf.
 S. Shao, C. Tunc, P. Satam, S. Hariri, Real-time IRC threat detection framework, in: Foundations and Applications of Self* Systems (FAS* W), 2017 IEEE 2nd International Workshops on, IEEE, 2017, pp. 318-323.
 CVE-2017-0144 Detail, October 2017. [Online] Available: https://nvd.ni st.gov/vuln/detail/CVE-2017-0144.
 A. Al Hasib, A.A.M.M. Haque, A comparative study of the performance and security issues of AES and RSA cryptography, in: Convergence and Hybrid Information Technology, 2008 ICCIT'08 Third International Conference on, vol. 2, IEEE, 2008, pp. 505-510.
 T.A. Mattei, Privacy, Confidentiality, and Security of Health Care Information: Lessons from the Recent WannaCry Cyberattack, in: World Neurosurgery, vol. 104, Elsevier, 2017, pp. 972-974. [OpenAIRE]
 N. Huq, R. Vosseler, Morton Swimmer, Cyberattacks against intelligent transportation systems, TrendMicro TrendsLabs, 2017. [Online] Available: https://documents.trendmicro.com/assets/white_papers/wp-cyberatt acks-against-intelligent-transportation-systems.pdf.