[Bhattacharjee, S., Salimitari, M., Chatterjee, M., Kwiat, K., & Kamhoua, C. (2017, November). Preserving data integrity in iot networks under opportunistic data manipulation. IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC/PiCom/DataCom/CyberSciTech), 446-453.10.1109/DASC-PICom-DataCom-CyberSciTec.2017.87]Search in Google Scholar
[Bracho, A., Saygin, C., Wan, H., Lee, Y., & Zarreh, A. (2018). A simulation-based platform for assessing the impact of cyber-threats on smart manufacturing systems. Procedia Manufacturing, Vol. 26, 1116-1127.10.1016/j.promfg.2018.07.148]Search in Google Scholar
[Copos, B., Levitt, K., Bishop, M., & Rowe, J. (2016, May). Is anybody home? Inferring activity from smart home network traffic. IEEE Security and Privacy Workshops (SPW), 245-251.10.1109/SPW.2016.48]Search in Google Scholar
[Dawson, M. (2018). Cyber security in industry 4.0: The pitfalls of having hyperconnected systems. Journal of Strategic Management Studies, Vol. 10, Issue 1, 19-28.]Search in Google Scholar
[Denning, D.E. (2012). Stuxnet: What has changed?. Future Internet, Vol. 4, Issue 3, 672-687.10.3390/fi4030672]Search in Google Scholar
[Department of Homeland Security. (2014). Section 10(a) and 10(b) Report on the United States Coast Guard (USCG) and Maritime Critical Infrastructure Cybersecurity Standards, Section 10(b) Report on the Department of Homeland Security’s Chemical Facility Anti-Terrorism Standards (CFATS). Section 10(b) Report on the Transportation Security Administration’s (TSA’s) Approach to Voluntary Industry Adoption of the NIST. Author.]Search in Google Scholar
[Friedman, A.A., Mack-Crane, A., & Hammond, R.A. (2013). Cyber-enabled Competitive Data Theft: A Framework for Modeling Long-Run Cybersecurity Consequences. Center for Technology Innovation at Brookings.]Search in Google Scholar
[Ge, X., Ye, J., Yang, Y., & Li, Q. (2016). User mobility evaluation for 5G small cell networks based on individual mobility model. IEEE Journal on Selected Areas in Communications, Vol. 34, Issue 3, 528-541.10.1109/JSAC.2016.2525439]Search in Google Scholar
[Lewis, J.A. (2002). Assessing the risks of cyber terrorism, cyber war and other cyber threats. Washington, DC: Center for Strategic & International Studies.]Search in Google Scholar
[Lewis, B.K. (2012). Social Media and Strategic Communications: Attitudes and perceptions Among College Students (Doctoral Dissertation). ProQuest Dissertations and Thesis Full Texts Database. Oklahoma State University, available at: http://www.prsa.org/Intelligence/PRJournal/Documents/2012LewisNichols.pdf, accessed on 13 September 2020.]Search in Google Scholar
[Lichtman, M., Rao, R., Marojevic, V., Reed, J., & Jover, R. P. (2018, May). 5G NR jamming, spoofing, and sniffing: threat assessment and mitigation. IEEE International Conference on Communications Workshops (ICC Workshops), 1-6.10.1109/ICCW.2018.8403769]Search in Google Scholar
[Munro, K. (2012). Deconstructing flame: the limitations of traditional defences. Computer Fraud & Security, Vol. 10, 8-11.10.1016/S1361-3723(12)70102-1]Search in Google Scholar
[National Institute of Standards and Technology (NIST). (2014). Framework for Improving Critical Infrastructure Cybersecurity. United States of America.]Search in Google Scholar
[Obama, B. (2013). Executive order 13636: Improving critical infrastructure cybersecurity. Federal Register, Vol. 78, Issue 33, 11739.]Search in Google Scholar
[Robles, R.J., Choi, M.K., Cho, E.S., Kim, S.S., Park, G., & Lee, J. (2008). Common threats and vulnerabilities of critical infrastructures. International Journal of Control and Automation, Vol. 1, Issue 1, 17-22.]Search in Google Scholar
[Tang, L., Jing, K., He, J., & Stanley, H. E. (2016). Complex interdependent supply chain networks: Cascading failure and robustness. Physica A: Statistical Mechanics and its Applications, Vol. 443, 58-69.10.1016/j.physa.2015.09.082]Search in Google Scholar
[The White House. (2014). Assessing Cybersecurity Regulations. Available at: http://m.whitehouse.gov/blog/2014/05/22/assessing-cybersecurity-regulations, accessed on 14 September 2020]Search in Google Scholar
[Ullah, H., Nair, N.G., Moore, A., Nugent, C., Muschamp, P., & Cuevas, M. (2019). 5G communication: an overview of vehicle-to-everything, drones, and healthcare use-cases. IEEE Access, Vol. 7, 37251-3726810.1109/ACCESS.2019.2905347]Search in Google Scholar
[Wells, L.J., Camelio, J.A., Williams, C.B., & White, J. (2014). Cyber-physical security challenges in manufacturing systems. Manufacturing Letters, Vol. 2, Issues 2, 74-77.10.1016/j.mfglet.2014.01.005]Search in Google Scholar
[Wilson, C. (2014). Cyber Threats to Critical Information Infrastructure. Cyberterrorism, 123-136.10.1007/978-1-4939-0962-9_7]Search in Google Scholar