Articles Data Breaches and Identity Theft | Page 22
Cyber security and the Internet of Things 85
[30]
[31]
[32]
[33]
[34]
[35]
[36]
[37]
[38]
[39]
[40]
[41]
[42]
International Conference on Privacy and Security in Mobile Systems
(PRISMS 2014), Aalborg, Denmark, May 2014.
D. Watts, “Security and vulnerability in electric power systems,” in 35th
North American power symposium, vol. 2, 2003, pp. 559–566.
D. L. Pipkin, Information security. Prentice Hall PTR, 2000.
E. Bertino, L. D. Martino, F. Paci, and A. C. Squicciarini, “Web
services threats, vulnerabilities, and countermeasures,” in Security
for Web Services and Service-Oriented Architectures. Springer, 2010,
pp. 25–44.
D. G. Padmavathi, M. Shanmugapriya et al., “A survey of attacks,
security mechanisms and challenges in wireless sensor networks,” arXiv
preprint arXiv:0909.0576, 2009.
H. G. Brauch, “Concepts of security threats, challenges, vulnerabilities
and risks,” in Coping with Global Environmental Change, Disasters and
Security. Springer, 2011, pp. 61–106.
K. Dahbur, B. Mohammad, and A. B. Tarakji, “A survey of risks,
threats and vulnerabilities in cloud computing,” in Proceedings of the
2011 International conference on intelligent semantic Web-services and
applications. ACM, 2011, p. 12.
R. K. Rainer and C. G. Cegielski, Introduction to information systems:
Enabling and transforming business. John Wiley & Sons, 2010.
A. J. Duncan, S. Creese, and M. Goldsmith, “Insider attacks in cloud
computing,” in Trust, Security and Privacy in Computing and Communi-
cations (TrustCom), 2012 IEEE 11th International Conference on. IEEE,
2012, pp. 857–862.
P. Baybutt, “Assessing risks from threats to process plants: Threat
and vulnerability analysis,” Process Safety Progress, vol. 21, no. 4,
pp. 269–275, 2002.
C. Tankard, “Advanced persistent threats and how to monitor and deter
them,” Network security, vol. 2011, no. 8, pp. 16–19, 2011.
F. Li, A. Lai, and D. Ddl, “Evidence of advanced persistent threat: A case
study of malware for political espionage,” in Malicious and Unwanted
Software (MALWARE), 2011 6th International Conference on. IEEE,
2011, pp. 102–109.
S. Ansari, S. Rajeev, and H. Chandrashekar, “Packet sniffing: a brief
introduction,” Potentials, IEEE, vol. 21, no. 5, pp. 17–19, 2002.
M. De Vivo, E. Carrasco, G. Isern, and G. O. de Vivo, “A review of
port scanning techniques,” ACM SIGCOMM Computer Communication
Review, vol. 29, no. 2, pp. 41–48, 1999.