Malware
Threats to the Energy Sector References Bernus, P., Noran, O. and Molina, A., 2015. Enterprise architecture: Twenty years of the
GERAM framework.
Annual Reviews in Control, 39, pp.83-93.
Huang, K., Siegel, M. and Madnick, S., 2019. Systematically Understanding the Cyber
Attack Business: A Survey.
ACM Computing Surveys, 51(4), pp.1-36.
Kumar, V., Prasad, J. and Samikannu, R., 2018. A critical review of cyber security and cyber terrorism - threats to critical infrastructure in the energy sector.
International Journal of Critical Infrastructures, 14(2), p.101.
Onyeji, I., Bazilian, M. and Bronk, C., 2014. Cyber
Security and Critical Energy Infrastructure.
The Electricity Journal, 27(2), pp.52-60.
Smith, D., 2018. Enhancing cybersecurity in the energy sector: A critical priority.
Journal of Energy & Natural Resources Law, 36(4), pp.373-380.
Sullivan, J. and Kamensky, D., 2017. How cyber-attacks in Ukraine show the vulnerability of the U.S. power grid.
The Electricity Journal, 30(3), pp.30-35.
Venkatachary, S., Prasad, J. and Samikannu, R., 2018. Cybersecurity and cyber terrorism - in energy sector – a review.
Journal of Cyber Security Technology, 2(3-4), pp.111-130.
Wadkar, M., Di Troia, F.
and Stamp, M., 2020. Detecting malware evolution using support vector machines.
Expert Systems with Applications, 143(1).
Wiese, F., Hilpert, S., Kaldemeyer, C. and Pleßmann, G., 2018. A qualitative evaluation approach for energy system modelling frameworks.
Energy, Sustainability and Society,
8(1).