INFORMAZIONI SU QUESTO ARTICOLO

Cita

Bhattacharjee, S., Salimitari, M., Chatterjee, M., Kwiat, K., & Kamhoua, C. (2017, November). Preserving data integrity in iot networks under opportunistic data manipulation. IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC/PiCom/DataCom/CyberSciTech), 446-453.10.1109/DASC-PICom-DataCom-CyberSciTec.2017.87Search in Google Scholar

Bracho, A., Saygin, C., Wan, H., Lee, Y., & Zarreh, A. (2018). A simulation-based platform for assessing the impact of cyber-threats on smart manufacturing systems. Procedia Manufacturing, Vol. 26, 1116-1127.10.1016/j.promfg.2018.07.148Search in Google Scholar

Copos, B., Levitt, K., Bishop, M., & Rowe, J. (2016, May). Is anybody home? Inferring activity from smart home network traffic. IEEE Security and Privacy Workshops (SPW), 245-251.10.1109/SPW.2016.48Search in Google Scholar

Dawson, M. (2018). Cyber security in industry 4.0: The pitfalls of having hyperconnected systems. Journal of Strategic Management Studies, Vol. 10, Issue 1, 19-28.Search in Google Scholar

Denning, D.E. (2012). Stuxnet: What has changed?. Future Internet, Vol. 4, Issue 3, 672-687.10.3390/fi4030672Search in Google Scholar

Department of Homeland Security. (2014). Section 10(a) and 10(b) Report on the United States Coast Guard (USCG) and Maritime Critical Infrastructure Cybersecurity Standards, Section 10(b) Report on the Department of Homeland Security’s Chemical Facility Anti-Terrorism Standards (CFATS). Section 10(b) Report on the Transportation Security Administration’s (TSA’s) Approach to Voluntary Industry Adoption of the NIST. Author.Search in Google Scholar

Friedman, A.A., Mack-Crane, A., & Hammond, R.A. (2013). Cyber-enabled Competitive Data Theft: A Framework for Modeling Long-Run Cybersecurity Consequences. Center for Technology Innovation at Brookings.Search in Google Scholar

Ge, X., Ye, J., Yang, Y., & Li, Q. (2016). User mobility evaluation for 5G small cell networks based on individual mobility model. IEEE Journal on Selected Areas in Communications, Vol. 34, Issue 3, 528-541.10.1109/JSAC.2016.2525439Search in Google Scholar

Lewis, J.A. (2002). Assessing the risks of cyber terrorism, cyber war and other cyber threats. Washington, DC: Center for Strategic & International Studies.Search in Google Scholar

Lewis, B.K. (2012). Social Media and Strategic Communications: Attitudes and perceptions Among College Students (Doctoral Dissertation). ProQuest Dissertations and Thesis Full Texts Database. Oklahoma State University, available at: http://www.prsa.org/Intelligence/PRJournal/Documents/2012LewisNichols.pdf, accessed on 13 September 2020.Search in Google Scholar

Lichtman, M., Rao, R., Marojevic, V., Reed, J., & Jover, R. P. (2018, May). 5G NR jamming, spoofing, and sniffing: threat assessment and mitigation. IEEE International Conference on Communications Workshops (ICC Workshops), 1-6.10.1109/ICCW.2018.8403769Search in Google Scholar

Munro, K. (2012). Deconstructing flame: the limitations of traditional defences. Computer Fraud & Security, Vol. 10, 8-11.10.1016/S1361-3723(12)70102-1Search in Google Scholar

National Institute of Standards and Technology (NIST). (2014). Framework for Improving Critical Infrastructure Cybersecurity. United States of America.Search in Google Scholar

Obama, B. (2013). Executive order 13636: Improving critical infrastructure cybersecurity. Federal Register, Vol. 78, Issue 33, 11739.Search in Google Scholar

Robles, R.J., Choi, M.K., Cho, E.S., Kim, S.S., Park, G., & Lee, J. (2008). Common threats and vulnerabilities of critical infrastructures. International Journal of Control and Automation, Vol. 1, Issue 1, 17-22.Search in Google Scholar

Tang, L., Jing, K., He, J., & Stanley, H. E. (2016). Complex interdependent supply chain networks: Cascading failure and robustness. Physica A: Statistical Mechanics and its Applications, Vol. 443, 58-69.10.1016/j.physa.2015.09.082Search in Google Scholar

The White House. (2014). Assessing Cybersecurity Regulations. Available at: http://m.whitehouse.gov/blog/2014/05/22/assessing-cybersecurity-regulations, accessed on 14 September 2020Search in Google Scholar

Ullah, H., Nair, N.G., Moore, A., Nugent, C., Muschamp, P., & Cuevas, M. (2019). 5G communication: an overview of vehicle-to-everything, drones, and healthcare use-cases. IEEE Access, Vol. 7, 37251-3726810.1109/ACCESS.2019.2905347Search in Google Scholar

Wells, L.J., Camelio, J.A., Williams, C.B., & White, J. (2014). Cyber-physical security challenges in manufacturing systems. Manufacturing Letters, Vol. 2, Issues 2, 74-77.10.1016/j.mfglet.2014.01.005Search in Google Scholar

Wilson, C. (2014). Cyber Threats to Critical Information Infrastructure. Cyberterrorism, 123-136.10.1007/978-1-4939-0962-9_7Search in Google Scholar

eISSN:
2247-840X
Lingua:
Inglese