-
1
-
-
85168252888
-
U.S. Says China's Government, Military Used Cyberespionage
-
May 7, 2013 ed.
-
Barnes J.E. U.S. Says China's Government, Military Used Cyberespionage. Wall Street Journal 2013, May 7, 2013 ed.
-
(2013)
Wall Street Journal
-
-
Barnes, J.E.1
-
5
-
-
80955142795
-
The cyber threat landscape: challenges and future research directions
-
Choo K.-K.R. The cyber threat landscape: challenges and future research directions. Computers & Security 2011, 30(8).
-
(2011)
Computers & Security
, vol.30
, Issue.8
-
-
Choo, K.-K.R.1
-
6
-
-
85168250317
-
Addressing cyber threats to oil and gas suppliers
-
Clayton B., Segal A. Addressing cyber threats to oil and gas suppliers. Energy Brief June 2013.
-
(2013)
Energy Brief
-
-
Clayton, B.1
Segal, A.2
-
7
-
-
38049034816
-
-
DHS Homeland Security
-
DHS Critical Infrastructure 2013, Homeland Security. http://www.dhs.gov/critical-infrastructure.
-
(2013)
Critical Infrastructure
-
-
-
8
-
-
85168239958
-
-
DHS, n.d. US Department of Homeland Security. Safeguarding and Security Cyberspace.
-
DHS, n.d. US Department of Homeland Security. Safeguarding and Security Cyberspace. http://www.dhs.gov/xlibrary/assets/pso-safeguarding-and-securing-cyberspace.pdf.
-
-
-
-
9
-
-
79955136633
-
-
EC European Commission 2 7
-
EC Digital Agenda for Europe 2013, European Commission 2 7. https://ec.europa.eu/digital-agenda/en/news/policy-critical-information-infrastructure-protection-ciip.
-
(2013)
Digital Agenda for Europe
-
-
-
10
-
-
84861935439
-
-
EIA U.S. Energy Information Administration
-
EIA Annual Energy Outlook 2012 2012, U.S. Energy Information Administration.
-
(2012)
Annual Energy Outlook 2012
-
-
-
11
-
-
84886215768
-
-
EU EUROPA Summaries of EU legislation 8 17
-
EU Critical infrastructure protection 2010, EUROPA Summaries of EU legislation 8 17. http://europa.eu/legislation_summaries/justice_freedom_security/fight_against_terrorism/l33259_en.htm.
-
(2010)
Critical infrastructure protection
-
-
-
12
-
-
67651048924
-
The lucrative world of cyber-espionage
-
Everett C. The lucrative world of cyber-espionage. Computer Fraud & Security 2009, 7.
-
(2009)
Computer Fraud & Security
, vol.7
-
-
Everett, C.1
-
13
-
-
85168236780
-
Stuxnet admission likely to have foreign policy consequences
-
Farivar, C. Stuxnet admission likely to have foreign policy consequences. Arstechnica 2012, June.
-
(2012)
Arstechnica
-
-
Farivar, C.1
-
15
-
-
77955582072
-
The challenge of cyber attack deterrence
-
Geers K. The challenge of cyber attack deterrence. Computer Law & Security Review 2010, 26(3).
-
(2010)
Computer Law & Security Review
, vol.26
, Issue.3
-
-
Geers, K.1
-
18
-
-
38349104843
-
Industrial espionage in a hi-tech world
-
Jones A. Industrial espionage in a hi-tech world. Computer Fraud & Security 2008, 1.
-
(2008)
Computer Fraud & Security
, vol.1
-
-
Jones, A.1
-
20
-
-
85168253060
-
Virus Aimed at Iran Infected Chevron Network
-
King R. Virus Aimed at Iran Infected Chevron Network. Wall Street Journal 2012.
-
(2012)
Wall Street Journal
-
-
King, R.1
-
21
-
-
78449305755
-
Cyber security for home users: a new way of protection through awareness enforcement
-
Kritzinger E., von Solms S.H. Cyber security for home users: a new way of protection through awareness enforcement. Computer & Security 2010, 29.
-
(2010)
Computer & Security
, vol.29
-
-
Kritzinger, E.1
von Solms, S.H.2
-
23
-
-
79952071955
-
An estimate of the value of lost load for Ireland
-
Leahy E., Richard S.J.T. An estimate of the value of lost load for Ireland. Energy Policy 2011, 39.
-
(2011)
Energy Policy
, vol.39
-
-
Leahy, E.1
Richard, S.J.T.2
-
25
-
-
84895891465
-
Cyber security countermeasures to combat cyber terrorism
-
Butterworth-Heinemann, B. Akhgar, S. Yates (Eds.)
-
MacKinnon L., Bacon L., Gan D., Loukas G., Chadwick D., Frangiskatos D. Cyber security countermeasures to combat cyber terrorism. Strategic Intelligence Management 2013, 234-261. Butterworth-Heinemann. B. Akhgar, S. Yates (Eds.).
-
(2013)
Strategic Intelligence Management
, pp. 234-261
-
-
MacKinnon, L.1
Bacon, L.2
Gan, D.3
Loukas, G.4
Chadwick, D.5
Frangiskatos, D.6
-
26
-
-
85168234768
-
-
Mills E. CNET. 8 27 2012, http://news.cnet.com/8301-1009_3-57501066-83/saudi-oil-firm-says-30000-computers-hit-by-virus/.
-
(2012)
CNET. 8 27
-
-
Mills, E.1
-
27
-
-
84861093550
-
SCADA security in the light of Cyber-Warfare
-
Nicholson A., Webber S., Dyer S., Patel T., Janicke H. SCADA security in the light of Cyber-Warfare. Computer & Security 2012, 31.
-
(2012)
Computer & Security
, vol.31
-
-
Nicholson, A.1
Webber, S.2
Dyer, S.3
Patel, T.4
Janicke, H.5
-
28
-
-
33846785112
-
The value of supply security - the cost of power interruption: economic input for damage reduction and investment networks
-
de Nooij M., Koopmans C., Bijvoet C. The value of supply security - the cost of power interruption: economic input for damage reduction and investment networks. Energy Economics 2007, 29.
-
(2007)
Energy Economics
, vol.29
-
-
de Nooij, M.1
Koopmans, C.2
Bijvoet, C.3
-
29
-
-
84897049836
-
-
NW3C Federal Bureau of Investigation and National White Collar Crime Center
-
NW3C Internet Crime Report 2012 2012, Federal Bureau of Investigation and National White Collar Crime Center.
-
(2012)
Internet Crime Report 2012
-
-
-
30
-
-
79960745153
-
Smart Grid cyber security for Europe
-
Pearson I.L.G. Smart Grid cyber security for Europe. Energy Policy 2011, 5211-5218.
-
(2011)
Energy Policy
, pp. 5211-5218
-
-
Pearson, I.L.G.1
-
31
-
-
84887074351
-
In Cyberattack on Saudi Firm, U.S. Sees Iran Firing Back
-
Perlroth N. In Cyberattack on Saudi Firm, U.S. Sees Iran Firing Back. New York Title 2012, 10(23).
-
(2012)
New York Title
, vol.10
, Issue.23
-
-
Perlroth, N.1
-
32
-
-
34249339041
-
Information age espionage, debriefing a real-world, top-class cyber sleuth
-
Power R., Forte D. Information age espionage, debriefing a real-world, top-class cyber sleuth. Computer Fraud & Security 2007, (5).
-
(2007)
Computer Fraud & Security
, Issue.5
-
-
Power, R.1
Forte, D.2
-
33
-
-
85168245821
-
-
Reuters. Reuters. January 21, 2013.
-
Reuters. Reuters. January 21, 2013. http://www.reuters.com/article/2013/01/21/us-sahara-crisis-idUSBRE90F1JJ20130121.
-
-
-
-
36
-
-
85168241456
-
Limiting free speech on the internet: cyber attack against internal dissidents in Iran and Russia
-
Elsevier, (Chapter 5)
-
Shakarian P., Shakarian J., Ruef A. Limiting free speech on the internet: cyber attack against internal dissidents in Iran and Russia. Introduction to Cyber-warfare 2013, Elsevier, (Chapter 5).
-
(2013)
Introduction to Cyber-warfare
-
-
Shakarian, P.1
Shakarian, J.2
Ruef, A.3
-
37
-
-
84877775094
-
Cyber terrorism challenges: the need for a global response to a multi-jurisdictional crime
-
Tehrani P.M., Manap N.A., Taji H. Cyber terrorism challenges: the need for a global response to a multi-jurisdictional crime. Computer Law & Security Review 2013, 29.
-
(2013)
Computer Law & Security Review
, vol.29
-
-
Tehrani, P.M.1
Manap, N.A.2
Taji, H.3
-
38
-
-
85168243816
-
Who needs cyber-spying
-
The Economist Feb. 23, 2013 ed.
-
The Economist Who needs cyber-spying. The Economist 2013, Feb. 23, 2013 ed.
-
(2013)
The Economist
-
-
-
39
-
-
85168237536
-
-
U.S.DOE
-
U.S.DOE Energy.gov. 6 27 2013, http://energy.gov/articles/energy-department-launches-public-private-initiative-help-oil-and-natural-gas-industry.
-
(2013)
Energy.gov. 6 27
-
-
-
41
-
-
84897043940
-
Energy infrastructure targeted as cyber attacks increase globally
-
Umbach F. Energy infrastructure targeted as cyber attacks increase globally. World Review 2013, 5(3). http://www.worldreview.info/content/energy-infrastructure-targeted-cyber-attacks-increase-globally.
-
(2013)
World Review
, vol.5
, Issue.3
-
-
Umbach, F.1
-
42
-
-
75349099263
-
Transnational infrastructure vulnerability: the historical shaping of the 2006 European "Blackout"
-
van der Vleuten E., Lagendijk V. Transnational infrastructure vulnerability: the historical shaping of the 2006 European "Blackout". Energy Policy 2010, 38.
-
(2010)
Energy Policy
, vol.38
-
-
van der Vleuten, E.1
Lagendijk, V.2
-
43
-
-
85168235854
-
Soft bomb' knocks out power plants
-
May 3
-
Walker M. Soft bomb' knocks out power plants. The Guardian 1999, May 3.
-
(1999)
The Guardian
-
-
Walker, M.1
-
44
-
-
84875747087
-
Cyber security in the Smart Grid: survey and challenges
-
Wang W., Lu Z. Cyber security in the Smart Grid: survey and challenges. Computer Networks 2013, 1344-1371.
-
(2013)
Computer Networks
, pp. 1344-1371
-
-
Wang, W.1
Lu, Z.2
|