D. Kushner, “The real story of stuxnet,” IEEE Spectrum, vol. 50, no. 3, pp. 48-53, March 2013.
 T. C. Robert M. Lee, Michael J. Assante, “Analysis of the cyber attack on the Ukranian power grid. defense use case.” SANS ICS, March 2016. [Online]. Available: http://www.nerc.com/pa/CI/ESISAC/ Documents/E-ISAC SANS Ukraine DUC 18Mar2016.pdf
 J. G. Kassakian, R. Schmalensee, G. Desgroseilliers, T. D. Heidel, K. Afridi, A. Farid, J. Grochow, W. Hogan, H. Jacoby, J. Kirtley et al., “The future of the electric grid,” Massachusetts Institute of Technology, Tech. Rep, pp. 197-234, 2011.
 Y. Liu, P. Ning, and M. Reiter, “False data injection attacks against state estimation in electric power grids,” ACM Transactions on Information and System Security (TISSEC), vol. 14, no. 1, pp. 1-33, May 2011.
 A. Sanjab and W. Saad, “Data injection attacks on smart grids with multiple adversaries: A game-theoretic perspective,” IEEE Transactions on Smart Grid, vol. to appear, 2016. [OpenAIRE]
 A. Sanjab and W. Saad, “On bounded rationality in cyber-physical systems security: Game-theoretic analysis and application to smart grid protection,” in IEEE/ACM CPS Week, Workshop on Cyber-Physical Security and Resilience in Smart Grids, April 2016. [OpenAIRE]
 Z. Zhang, S. Gong, A. Dimitrovski, and H. Li, “Time synchronization attack in smart grid: Impact and analysis,” IEEE Transactions on Smart Grid, vol. 4, no. 1, pp. 87-98, March 2013.
 Y. Mo and B. Sinopoli, “Secure control against replay attacks,” in 47th Annual Allerton Conference on Communication, Control, and Computing, Sept. 2009, pp. 911-918. [OpenAIRE]
 F. Pasqualetti, F. Dorfler, and F. Bullo, “Attack detection and identification in cyber-physical systems,” IEEE Transactions on Automatic Control, vol. 58, no. 11, pp. 2715-2729, Nov 2013. [OpenAIRE]
 J. Pagliery, “Sniper attack on california power grid may have been an insider, dhs says,” CNN. com.
 W. Niemira, R. Bobba, P. Sauer, and W. Sanders, “Malicious data detection in state estimation leveraging system losses and estimation of perturbed parameters,” in IEEE International Conference on Smart Grid Communications (SmartGridComm), Oct. 2013, pp. 402-407.
 Z. Zhang, M. Trinkle, A. D. Dimitrovski, and H. Li, “Combating time synchronization attack: A cross layer defense mechanism,” in ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS), April 2013, pp. 141-149.
 J. P. Hespanha, P. Naghshtabrizi, and Y. Xu, “A survey of recent results in networked control systems,” Proceedings of the IEEE, vol. 95, no. 1, pp. 138-162, Jan. 2007.
 S. Bi and Y. J. Zhang, “Graphical methods for defense against false-data injection attacks on power system state estimation,” IEEE Transactions on Smart Grid, vol. 5, no. 3, pp. 1216-1227, May 2014.
 T. Alpcan and T. Bas¸ar, Network security: a decision and game-theoretic approach. New York: Cambridge University Press, 2011.