S. Checkoway, D. McCoy, B. Kantor, D. Anderson, Shacham, S. H. Savage, K. Kocher, A. Czeskis, F. Roesner, and T. Kohno, “Comprehensive experimental analyses of automotive attack surfaces,” in Proc. USENIX Security Symposium, 2011.
A. J. Kerns, D. P. Shepard, J. A. Bhatti, and T. E. Humphreys, “Unmanned aircraft capture and control via GPS spoofing,” J. Field Robot., vol. 31, pp. 617-636, 2014.
J. Slay and M. Miller, “Lessons learned from the Maroochy water breach,” in Proc. Critical Infrastructure Protection, vol. 253, 2007, pp. 73-82.
J. P. Farwell and R. Rohozinski, “Stuxnet and the future of cyber war,” Survival, vol. 53, pp. 23-40, 2011.
T. De Maiziere, “Die Lage der IT-Sicherheit in Deutschland 2014,” Tech. Report, Federal Office for Information Security, 2014. [Online]. Available: http://www.wired.com/wp-content/uploads/2015/01/Lagebericht2014.pdf