Amazon S3 Top 1 million websites. URL http://s3.amazonaws.com/alexastatic/top-1m.csv.zip
B. AndersonD. McGrew Identifying encrypted malware traffic with contextual flow data Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security AISec ’16 35 46 2016
CISCO. Whitepaper: Encrypted traffic analysis Jan 2019 URL https://www.cisco.com/c/dam/en/us/solutions/collateral/enterprise-networks/enterprise-network-security/nb-09-encrytd-trafanlytcs-wp-cte-en.pdf
Cisco Systems URL https://github.com/cisco/joy
A. Greenberg The untold story of NotPetya, the most devastating cyberattack in history URL https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/
H2020 ICT 2016 project 5G-MoNArch Deliverable D3.1: Initial resilience and security analysis Jun 2018 URL https://5g-monarch.eu/smart-sea-port-use-case/
L. H. Newman Menacing malware shows the dangers of industrial system sabotage URL https://www.wired.com/story/triton-malware-dangers-industrial-systemsabotage/
PAiCE. Research projects URL https://www.din.de/en/innovation-and-research/research-projects/industry-4-0/paice-271784
C. Pettey When IT and operational technology converge Jan 2017 URL https://www.gartner.com/smarterwithgartner/when-it-and-operational-technology-converge/
PI North America. PROFINET, industrial ethernet for advanced manufacturing URL http://us.profinet.com/technology/profinet/
Wireshark URL https://www.wireshark.org/
K. Zetter An unprecedented look at Stuxnet, the world’s first digital weapon URL https://www.wired.com/2014/11/countdown-to-zero-day-stuxnet/