[Alexander, C. (1977). A Pattern Language: Towns, Buildings, Construction. Oxford: University Press.]Search in Google Scholar
[Andress, J. (2014). The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice. Amsterdam: Syngress.]Search in Google Scholar
[Batty, M., Axhausen, K. W., Giannotti, F., Pozdnoukhov, A.,Bazzani, A., Wachowicz, M., et al. (2012). Smart cities of the future. European Physical Journal Special Topics, 214 (1), 481–51810.1140/epjst/e2012-01703-3]Search in Google Scholar
[Birkmann, J. J., & von Teichman, K. (2010). Integrating disaster risk reduction and climate change adaptation: Key challenges—scales, knowledge, and norms. Sustainability Science, 5(2), 171–184.10.1007/s11625-010-0108-y]Search in Google Scholar
[Busbach-Richard, U. (2019). The Case of IT-Security: Anti-Patterns in Policy Making and its Implementation. Book of Abstracts of the First International Conference on Sustainable Development in Business and Economics. Skopje: IBI/IBF.]Search in Google Scholar
[Caragliu, A., Del Bo, C., and Nijkamp, P. (2009). Smart Cities in Europe. Series Research Memoranda 0048. Amsterdam: VU University Amsterdam, Faculty of Economics, Business Administration and Econometrics.]Search in Google Scholar
[Conti, G., Cross, T., Raymond, D. (2015). Pen Testing a City Retrieved from https://www.blackhat.com/docs/us-15/materials/us-15-Conti-Pen-Testing-A-City-wp.pdf on September 24th 2019.]Search in Google Scholar
[De la Poterie, A. T., & Baudoin, M. A. (2015). From Yokohama to Sendai: Approaches to participation in international disaster risk reduction frameworks. International Journal of Disaster Risk Science, 6(2), 128–139.10.1007/s13753-015-0053-6]Search in Google Scholar
[Essays, UK. (2018). The Importance Of Security In Distributed Systems Information Technology Essay. Retrieved from https://www.ukessays.com/essays/information-technology/the-importance-of-security-in-distributed-systems-information-technology-essay.php?vref=1 on September 24th 2019.]Search in Google Scholar
[Garousi, G., Garousi-Yusifoglu, V., Ruhe, G., Zhi, J., Moussavi, M., & Smith, B. (2015). Usage and usefulness of technical software documentation: An industrial case study. Information and Software Technology, 57, 664–68210.1016/j.infsof.2014.08.003]Search in Google Scholar
[Fernandez-Buglioni, E. (2013) Security Patterns in Practice: Designing Secure Architectures Using Software Patterns. Hoboken: Wiley Publishing]Search in Google Scholar
[Gamma, E., Helm. R., Johnson, R. & Vlissides, J. (1994). Design Patterns (the Gang of Four book). Boston: Addison-Wesley.]Search in Google Scholar
[Garousi, G., Garousi, V., Ruhe, G., Zhi, J., Moussavi, M., & Smith, B. (2015). Usage and usefulness of technical software documentation: An industrial case study. Information & Software Technology, 57, 664–682.10.1016/j.infsof.2014.08.003]Search in Google Scholar
[Hancke, G. P., de Carvalho e Silva, B., & Hancke, G. P, Jr. (2013). The role of advanced sensing in smart cities. Sensors, 13 (1), 393–425.]Search in Google Scholar
[Harinath, D., Satyanarayana, P. (2017). A Review on Security Issues and Attacks in Distributed Systems. Journal of Advances in Information Technology, 8 (1), 1–9.10.12720/jait.8.1.1-9]Search in Google Scholar
[Hayslip, G. (2016) What I have learned as CISO for a Smart City. Retrieved from https://www.linkedin.com/pulse/what-i-have-learned-ciso-smart-city-cissp-cisa-crisc-ccsk?articleId=6099504343512272896#comments-6099504343512272896&trk=prof-post on September 24th 2019.]Search in Google Scholar
[ISACA (2009). The Risk-IT-Framework-Excerpt. Retrieved from https://m.isaca.org/Knowledge-Center/Research/Documents/Risk-IT-Framework-Excerpt_fmk_Eng_0109.pdf on September 26th 2019.]Search in Google Scholar
[ISACA (2019). COBIT 2019 Publications & Resources. Retrieved from http://www.isaca.org/COBIT/Pages/COBIT-2019-Publications-Resources.aspx on September 26th 2019.]Search in Google Scholar
[ISO/IEC (2018). ISO/IEC 27005:2018 - Information technology - Security techniques - Information security risk management (third edition). Retrieved from https://www.iso27001security.com/html/27005.html on September 26th 2019.]Search in Google Scholar
[Mijalkovic, Sasa & Cvetković, Vladimir. (2013). VULNERABILITY OF CRITICAL INFRASTRUCTURE BY NATURAL DISASTERS.]Search in Google Scholar
[NIST (2018). Framework for Improving Critical Infrastructure Cybersecurity. Retrieved from https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf on September 26th 2019.]Search in Google Scholar
[Nussbaum, B. (2014). The ‘Levels of Analysis’ Problem with Critical Infrastructure Risk. In Journal of Physical Security, 7(1), 43–50.]Search in Google Scholar
[O’Rouke, T.D. (2007). Critical infrastructure, interdependencies and resilience. The Bridge Vol. 37 No. 1, 22–29.]Search in Google Scholar
[Perrin, C. (2008). The CIA Triad. Retrieved from https://www.techrepublic.com/blog/it-security/the-cia-triad/ on September 24th 2019.]Search in Google Scholar
[Ray-Bennett, N. S., Mendez, D., Alam, E., & Morgner, C. (2020). Inter-agency collaboration in natural hazard management in developed countries. In B. J. Gerber (Ed.), The Oxford encyclopedia of natural hazards governance. New York, NY: Oxford University Press.]Search in Google Scholar
[Robert, B., Morabito, L., Cloutier, I., & Hémond, Y. (2015). Interdependent critical infrastructures resilience: Methodology and case study. Disaster Prevention and Management, 24(1), 70–79.10.1108/DPM-10-2013-0195]Search in Google Scholar
[Schaffers, H., Komninos, N., Pallot, M., Trousse, B., Nilsson,M., & Oliveira, A. (2011). Smart cities and the future internet: Towards cooperation frameworks for open innovation. J. Domingue, et al. Eds.), Future Internet Assembly pp. 431–446. LNCS: Springer.]Search in Google Scholar
[Townsend, A. (2013).Smart cities: Big data, civic hackers, and the quest for a new utopia. New York: W.W. Norton & Co.]Search in Google Scholar
[Thomalla, F., Downing, T., Spanger Siegfried, E., Han, G., & Rockstrom, J. (2006). Reducing hazard vulnerability: towards a common approach between disaster risk reduction and climate adaptation. Disasters, 30(1), 39–48.10.1111/j.1467-9523.2006.00305.x]Search in Google Scholar
[Thomas, D. S., Phillips, B. D., Lovekamp, W. E., & Fothergill, A. (2013). Social vulnerability to disasters. Baton Roca, FL: CRC Press.10.1201/b14854]Search in Google Scholar
[United Nations. (2010). Natural hazards, unnatural disasters: the economics of effective prevention.]Search in Google Scholar
[UNISDR (United Nations International Strategy for Disaster Reduction). (2009). 2009 UNISDR terminology on disaster risk reduction. Geneva, Switzerland: United Nations.]Search in Google Scholar
[Yoder, J., Barcalow, J. (1997). Architectural patterns for enabling application security. In Proceedings of the 4th Conference on Patterns Languages of Programming (PLoP’97).]Search in Google Scholar