Articles Data Breaches and Identity Theft | Page 23
86 M. Abomhara and G. M. Køien
[43] I. Naumann and G. Hogben, “Privacy features of european eid card
specifications,” Network Security, vol. 2008, no. 8, pp. 9–13, 2008.
[44] C. Wilson, “Botnets, cybercrime, and cyberterrorism: Vulnerabilities and
policy issues for congress.” DTIC Document, 2008.
[45] A. Daneels and W. Salter, “What is scada,” in International Conference
on Accelerator and Large Experimental Physics Control Systems, 1999,
pp. 339–343.
[46] A. Nicholson, S. Webber, S. Dyer, T. Patel, and H. Janicke, “Scada
security in the light of cyber-warfare,” Computers & Security, vol. 31,
no. 4, pp. 418–436, 2012.
[47] V. M. Igure, S. A. Laughter, and R. D. Williams, “Security issues in scada
networks,” Computers & Security, vol. 25, no. 7, pp. 498–506, 2006.
[48] M. Kelleye, “Business Insider. The Stuxnet attack on Irans
Nuclear Plant was Far more Dangerous Than Previously Thought,”
http://www.businessinsider.com/stuxnet-was-far-more-dangerous-than-
previous-thought-2013-11/,2013, [Online; accessed 03-Sep-2014].
[49] B. Jung, I. Han, and S. Lee, “Security threats to internet: a korean
multi-industry investigation,” Information & Management, vol. 38, no. 8,
pp. 487–498, 2001.
[50] C. P. Mayer, “Security and privacy challenges in the internet of things,”
Electronic Communications of the EASST, vol. 17, 2009.
[51] A. R. Beresford, “Location privacy in ubiquitous computing,” Com-
puter Laboratory, University of Cambridge, Tech. Rep, vol. 612,
2005.
[52] S. Pramanik, “Threat motivation,” in Emerging Technologies for a
Smarter World (CEWIT), 2013 10th International Conference and Expo
on. IEEE, 2013, pp. 1–5.
[53] D. Dolev and A. C. Yao, “On the security of public key protocols,”
Information Theory, IEEE Transactions on, vol. 29, no. 2, pp. 198–208,
1983.
[54] I. Cervesato, “The dolev-yao intruder is the most powerful attacker,”
in 16th Annual Symposium on Logic in Computer ScienceLICS, vol. 1.
Citeseer, 2001.
[55] J. Sheldon, “State of the art: Attackers and targets in cyberspace,” Journal
of Military and Strategic Studies, vol. 14, no. 2, 2012.
[56] E. M. Archer, “Crossing the rubicon: Understanding cyber terrorism
in the european context,” The European Legacy, no. ahead-of-print,
pp. 1–16, 2014.