"The Meaning of Stuxnet". The Economist. 30 September 2010. Archived from the original on 30 March 2015. Retrieved 18 April 2015.
exida.com
Byres, Eric; Cusimano, John (16 February 2012). "The 7 Steps to ICS Security". Tofino Security and exida Consulting LLC. Archived from the original on 23 January 2013. Retrieved 3 March 2011.
Hounshell, Blake (27 September 2010). "6 mysteries about Stuxnet". Foreign Policy. Archived from the original on 9 February 2014. Retrieved 28 September 2010.
foreignpolicy.com
"Stuxnet's Secret Twin". Foreign Policy. 19 November 2013. Archived from the original on 4 December 2014. Retrieved 11 March 2017.
Marty Edwards (Idaho National Laboratory) & Todd Stauffer (Siemens). 2008 Automation Summit: A User's Conference(PDF). United States Department of Homeland Security. p. 35. Archived(PDF) from the original on 20 January 2011. Retrieved 18 January 2011.
Aneja, Atul (26 September 2010). "Under cyber-attack, says Iran". The Hindu. Chennai, India. Archived from the original on 29 September 2010. Retrieved 27 September 2010.
Gross, Michael Joseph (April 2011). "A Declaration of Cyber-War". Vanity Fair. Archived from the original on 31 August 2021. Retrieved 31 December 2015.
Gross, Michael Joseph (April 2011). "A Declaration of Cyber-War". Vanity Fair. Condé Nast. Archived from the original on 31 August 2021. Retrieved 31 December 2015.
Modderkolk, Huib (8 January 2024). "Sabotage in Iran: Een missie in duisternis" [Sabotage in Iran: A Mission in Darkness]. De Volksrant (in Dutch). Archived from the original on 8 January 2024. Retrieved 8 January 2024.
Gross, Michael Joseph (April 2011). "A Declaration of Cyber-War". Vanity Fair. Archived from the original on 31 August 2021. Retrieved 31 December 2015.
Gross, Michael Joseph (April 2011). "A Declaration of Cyber-War". Vanity Fair. Condé Nast. Archived from the original on 31 August 2021. Retrieved 31 December 2015.
"Rootkit.TmpHider". wilderssecurity.com. Wilders Security Forums. Archived from the original on 15 December 2013. Retrieved 25 March 2014.
Marty Edwards (Idaho National Laboratory) & Todd Stauffer (Siemens). 2008 Automation Summit: A User's Conference(PDF). United States Department of Homeland Security. p. 35. Archived(PDF) from the original on 20 January 2011. Retrieved 18 January 2011.
Byres, Eric; Cusimano, John (16 February 2012). "The 7 Steps to ICS Security". Tofino Security and exida Consulting LLC. Archived from the original on 23 January 2013. Retrieved 3 March 2011.
Modderkolk, Huib (8 January 2024). "Sabotage in Iran: Een missie in duisternis" [Sabotage in Iran: A Mission in Darkness]. De Volksrant (in Dutch). Archived from the original on 8 January 2024. Retrieved 8 January 2024.
Aneja, Atul (26 September 2010). "Under cyber-attack, says Iran". The Hindu. Chennai, India. Archived from the original on 29 September 2010. Retrieved 27 September 2010.
Hounshell, Blake (27 September 2010). "6 mysteries about Stuxnet". Foreign Policy. Archived from the original on 9 February 2014. Retrieved 28 September 2010.