[1] J. Sullivant, “Strategies for Protecting National Critical Assets,” Wiley, New York, 2007. doi:10.1002/9780470228371
[2] J. Bullock and D. Haddow, “Introduction to Homeland Security,” New Jersey: Prentice Hall, Upper Saddle River, 2006.
[3] M. Amin “Toward Self-Healing Infrastructure Systems,” IEEE Computer Application Power, Vol. 33, No. 8, 2000, pp. 45-53.
[4] Y. Haimes, “Risk Modeling, Assessment, and Manage- ment,” John Wiley & Sons, New York, 1998.
[5] Y. Haimes and P. Jiang, “Leontief-Based Model of Risk in Complex Interconnected Infrastructures,” Journal of Infrastructure Systems, Vol. 7, No. 1, 2001, pp. 23-27. doi:10.1061/(ASCE)1076-0342(2001)7:1(1)
[6] S. Rosenbush, “Satellites’s Death Puts Millions out of Touch,” USA Today, May 1998. www.ieeexplore.ieee.org
[7] D. Verton, “Black Ice: The Invisible Threat of Cyberterrorism,” McGraw Hill, Upper Saddle River, 2003.
[8] J. Willenssen, “Critical Infrastructure Protection Signify- cant Challenges in Safeguarding Interdependences,” Oxford University Press, Oxford, 2007.