[1] E. Luiijf, and B. Jan te Paske, “Cyber Security of Industrial Control Systems,” TNO, The Hague, The Netherlands, 2015.##
[2] W. Knowles, D. Prince, and D. Hutchison, “A survey of cyber security management in industrial control systems,” Science Direct Journal, Published by Elsevier B.V, 3 March 2015.##
[3] S. Akbari, “The Basics of Distributed Control Systems,” Tehran, Publishing Idehnegar, 2014. (In Persian)##
[4] G. D. Sadowsky, X. James, A. Greenberg, B. J. Mack, and A. Schwartz, “Information Technology Security Handbook,” USA, publisher: The World Bank, 2003.##
[5] “International Standard Organization,” ISO 27001 Edition 2005: Information Technology, Security Techniques, Information Security Management Systems, Requirements, Translation: Institute for Standard and Industrial Research of Iran, 2008. (In Persian)##
[6] T. J. Mowbray, “Cybersecurity Managing Systems,” Conducting Testing, and Investigating Intrusions, Indiana (USA), John Wiley & Sons, 2014.##
[7] J. M. Colbert and E. K. Alexander, “Cyber-security of SCADA and other Industrial Control Systems,” Switzerland: Springer International Publishing, 2016.##
[8] S. Tarasi, “Identification and Prioritization of Barriers to Implementing Industrial control systems Security Management with Interpretative Structural Modeling (ISM),” Case Study of Mobarakeh Steel Co., Master's thesis, Payame Noor University Tehran West, 2018. (In Persian)##
[9] A. Azar and F. Khosravani, “Investigating Soft Operations (Problems Structural Approaches),” Tehran, the publisher of the Industrial Management Organization, 1392. (In Persian)##
[10] G. R. Khaki, “Research method with a dissertational approach,” Tehran, Payame Noor University Press, 2011. (In Persian)##
[11] D. E. Hinkle, W. Wiersma, and S. G. Jurs, “Applied Statistics for the Behavioral Sciences,” 5th ed. Boston, Houghton Mifflin, 2003.##