Bibliographical review on cyber attacks from a control oriented perspective

HS Sánchez, D Rotondo, T Escobet, V Puig… - Annual Reviews in …, 2019 - Elsevier
This paper presents a bibliographical review of definitions, classifications and applications
concerning cyber attacks in networked control systems (NCSs) and cyber-physical systems …

[HTML][HTML] Ethical hacking for IoT: Security issues, challenges, solutions and recommendations

JPA Yaacoub, HN Noura, O Salman… - Internet of Things and …, 2023 - Elsevier
In recent years, attacks against various Internet-of-Things systems, networks, servers,
devices, and applications witnessed a sharp increase, especially with the presence of 35.82 …

Looking back to look forward: Lessons learnt from cyber-attacks on industrial control systems

T Miller, A Staves, S Maesschalck, M Sturdee… - International Journal of …, 2021 - Elsevier
Since the 1980s, we have observed a range of cyberattacks targeting Industrial Control
Systems (ICS), some of which have impacted elements of critical national infrastructure …

[PDF][PDF] Теория коммуникации

ГГ Почепцов - 2001 - 212.112.113.247
В современных условиях резко изменилось отношение к коммуникации. В обществе
жесткой иерархии, каковым являлся Советский Союз, главенствовала только …

A survey SCADA of and critical infrastructure incidents

B Miller, D Rowe - Proceedings of the 1st Annual conference on …, 2012 - dl.acm.org
In this paper, we analyze several cyber-security incidents involving critical infrastructure and
SCADA systems. We classify these incidents based on Source Sector, Method of …

Cybercrime and society

M Yar, KF Steinmetz - 2023 - torrossa.com
The previous chapters explored cybercriminal activities associated with computer intrusion
and manipulation, which are generally labelled as hacking. This chapter critically explores …

[图书][B] Principles of cybercrime

J Clough - 2015 - books.google.com
Digital technology has transformed the way in which we socialise and do business. Proving
the maxim that crime follows opportunity, virtually every advance has been accompanied by …

Behind the curve: Globalization and international terrorism

AK Cronin - International security, 2002 - JSTOR
The coincidence be-tween the evolving changes of globalization, the inherent weaknesses
of the Arab region, and the inadequate American response to both ensures that ter-rorism …

[图书][B] Cybercrime: Investigating high-technology computer crime

R Moore - 2014 - taylorfrancis.com
This innovative text provides an excellent introduction to technology-assisted crime and the
basics of investigating such crime, from the criminal justice perspective. It presents clear …

[图书][B] Global terrorism

B Lutz - 2019 - taylorfrancis.com
Global Terrorism, 4th edition continues to provide students with the most comprehensive
introduction to terrorism as a global phenomenon. It introduces students to history, politics …