Sunteți pe pagina 1din 2

Kent, A.D., 2016. Cyber security data sources for dynamic network research.

In Dynamic

Networks and Cyber-Security (pp. 37-65).

Finnemore, M. and Hollis, D.B., 2016. Constructing norms for global cybersecurity. American

Journal of International Law, 110(3), pp.425-479.

Nazir, S., Patel, S. and Patel, D., 2017. Assessing and augmenting SCADA cyber security: A

survey of techniques. Computers & Security, 70, pp.436-454.

Almeshekah, M.H. and Spafford, E.H., 2016. Cyber security deception. In Cyber deception (pp.

23-50). Springer, Cham.

Khatoun, R. and Zeadally, S., 2017. Cybersecurity and privacy solutions in smart cities. IEEE

Communications Magazine, 55(3), pp.51-59.

Yousefi-Azar, M., Varadharajan, V., Hamey, L. and Tupakula, U., 2017, May. Autoencoder-based

feature learning for cyber security applications. In 2017 International joint conference on neural

networks (IJCNN) (pp. 3854-3861). IEEE.

Taylor, P.J., Dargahi, T., Dehghantanha, A., Parizi, R.M. and Choo, K.K.R., 2019. A systematic

literature review of blockchain cyber security. Digital Communications and Networks.

Li, Z., Shahidehpour, M. and Aminifar, F., 2017. Cybersecurity in distributed power

systems. Proceedings of the IEEE, 105(7), pp.1367-1388.

de Bruijn, H. and Janssen, M., 2017. Building cybersecurity awareness: The need for evidence-

based framing strategies. Government Information Quarterly, 34(1), pp.1-7.


Lamba, A., Singh, S., Balvinder, S., Dutta, N. and Rela, S., 2017. Mitigating Cyber Security

Threats of Industrial Control Systems (Scada & Dcs). In 3rd International Conference on

Emerging Technologies in Engineering, Biomedical, Medical and Science (ETEBMS–July 2017).

Schatz, D., Bashroush, R. and Wall, J., 2017. Towards a more representative definition of cyber

security. Journal of Digital Forensics, Security and Law, 12(2), pp.53-74.

Sun, N., Zhang, J., Rimba, P., Gao, S., Zhang, L.Y. and Xiang, Y., 2018. Data-driven cybersecurity

incident prediction: A survey. IEEE Communications Surveys & Tutorials, 21(2), pp.1744-1772.

Hemilä, J., Mikkola, M. and Salonen, J., 2019, December. Management of Cyber Security Threats

in the Factories of the Future Supply Chains. In 9th International Conference on Operations and

Supply Chain Management, OSCM 2019.

Van Schaik, P., Jeske, D., Onibokun, J., Coventry, L., Jansen, J. and Kusev, P., 2017. Risk

perceptions of cyber-security and precautionary behaviour. Computers in Human Behavior, 75,

pp.547-559.

Edgar, T.W. and Manz, D.O., 2017. Research methods for cyber security. Syngress.

Kostopoulos, G., 2017. Cyberspace and cybersecurity. Auerbach Publications.

S-ar putea să vă placă și