Policy and the Internet of Things." Connections: The Quarterly Journal 15, no. 2 (2016): 9-18. "
Nanotechnology and Global Security." Connections: The Quarterly Journal 15, no. 2 (2016): 31-47. "
Cyber-attacks on ERP systems: An analysis of the current threat landscape." Datenschutz und Datensicherheit 36, no. 9 (2012): 653-656. "
Why are ERP systems an easy target for cyber-attacks?" Defense Magazine (2013). "
"Council Directive 2008/114/EC of 8 December 2008 on the identification and designation of European critical infrastructures and the assessment of the need to improve their protection." Official Journal L 345 (2008): 75-82.
The Cyber Attack on Saudi Aramco." Survival 55, no. 2 (2013): 81-96. "
Cyber attacks on Ukraine's power grid: to what end?. IISS Cyber security, 2017.
The Vulnerability of UAVs to Cyber Attacks – An Approach to the Risk Assessment In 2013 5th International Conference on Cyber Conflict (CYCON 2013). Tallin: NATO CCD COE, 2013.
How to Safely Flight Test a UAV Subject to Cyber-Attacks In Cyber Defence Situation Awareness Symposium (STO-MP-IST-999), ., 2014.
Securing the Internet of Things a military perspective In IEEE 2nd World Forum on Internet of Things (WF-IoT). Milan, Italy, 2015.
Connected devices create millions of cyber security weak spots." Financial Times (2016). "
Postmarket Management of Cybersecurity in Medical Devices, Guidance for Industry and Food and Drug Administration Staff., 2016.
Cybersecurity vulnerabilities in medical devices: a complex environment and multifaceted problem." Medical Devices 8 (2015): 305-316. "
The Decision to Attack: Military and Intelligence Cyber Decision-Making. Athens, GA: University of Georgia Press, 2016.
Thinking, Fast and Slow. New York: Farrar, Strauss, and Giroux, 2013.
A Security Architecture in Cyber-Physical Systems: Security Theories, Analysis, Simulation and Application Fields." International Journal of Security and Its Applications 9, no. 7 (2015): 1-16. "
Power Infrastructure Cybersecurity Laboratory, Department of Electrical and Computer Engineering, Iowa State University., 2017.
Key Terrain in Cyberspace: Seeking the High Ground In 6th International Conference on Cyber Conflict. Tallinn, Estonia, 2014.
Cyber Terrain: A Model for Increased Understanding of Cyber Activity. Centre for Strategi Cyberspace + Security Science, 2016.
Supply Chain Cyber Security – Potential Threats." Information & Security: An International Journal 29, no. 1 (2013): 51-68. "
CERT Resilience Management Model (CERT-RMM): A Maturity Model for Managing Operational Resilience In SEI Series in Software Engineering. (Uper Saddle River, NJ: Addison-Wesley, 2011.