Dr. Amir Esmaeily



Download 195.8 Kb.
View original pdf
Page7/7
Date16.01.2023
Size195.8 Kb.
#60384
1   2   3   4   5   6   7
project proposal Muhammad
Work Plan





Malware Threats to the Energy Sector
References

Bernus, P., Noran, O. and Molina, A., 2015. Enterprise architecture: Twenty years of the
GERAM framework. Annual Reviews in Control, 39, pp.83-93.
Huang, K., Siegel, M. and Madnick, S., 2019. Systematically Understanding the Cyber
Attack Business: A Survey. ACM Computing Surveys, 51(4), pp.1-36.
Kumar, V., Prasad, J. and Samikannu, R., 2018. A critical review of cyber security and cyber terrorism - threats to critical infrastructure in the energy sector. International Journal of
Critical Infrastructures, 14(2), p.101.
Onyeji, I., Bazilian, M. and Bronk, C., 2014. Cyber Security and Critical Energy
Infrastructure. The Electricity Journal, 27(2), pp.52-60.
Smith, D., 2018. Enhancing cybersecurity in the energy sector: A critical priority. Journal of
Energy & Natural Resources Law, 36(4), pp.373-380.
Sullivan, J. and Kamensky, D., 2017. How cyber-attacks in Ukraine show the vulnerability of the U.S. power grid. The Electricity Journal, 30(3), pp.30-35.
Venkatachary, S., Prasad, J. and Samikannu, R., 2018. Cybersecurity and cyber terrorism - in energy sector – a review. Journal of Cyber Security Technology, 2(3-4), pp.111-130.
Wadkar, M., Di Troia, F. and Stamp, M., 2020. Detecting malware evolution using support vector machines. Expert Systems with Applications, 143(1).
Wiese, F., Hilpert, S., Kaldemeyer, C. and Pleßmann, G., 2018. A qualitative evaluation approach for energy system modelling frameworks. Energy, Sustainability and Society,
8(1).

Download 195.8 Kb.

Share with your friends:
1   2   3   4   5   6   7




The database is protected by copyright ©ininet.org 2024
send message

    Main page