TY - STD TI - United Nations. 68% of the world population projected to live in urban areas by 2050. 2018. https://www.un.org/development/desa/en/news/population/2018-revision-of-world-urbanization-prospects.html. Accessed 15 Apr 2020. UR - https://www.un.org/development/desa/en/news/population/2018-revision-of-world-urbanization-prospects.html ID - ref1 ER - TY - STD TI - City Profile. Smart cities world. https://www.smartcitiesworld.net/smart-cities-profile. Accessed 25 Apr 2020. UR - https://www.smartcitiesworld.net/smart-cities-profile ID - ref2 ER - TY - STD TI - Singapore uses IoT to create smart buildings. 2016. https://www.smart-energy.com/regional-news/asia/singapore-iot-smart-buildings/. Accessed 15 Apr 2020. UR - https://www.smart-energy.com/regional-news/asia/singapore-iot-smart-buildings/ ID - ref3 ER - TY - STD TI - Building a smart + equitable city. The official website of the City of New York. 2015. https://www1.nyc.gov/assets/forward/documents/NYC-Smart-Equitable-City-Final.pdf. Accessed 05 Apr 2020. UR - https://www1.nyc.gov/assets/forward/documents/NYC-Smart-Equitable-City-Final.pdf ID - ref4 ER - TY - STD TI - IBM. City of Rio de Janeiro and IBM collaborate to advance emergency response system; access to real-time information empowers citizens. 2011. https://www.prnewswire.com/news-releases/city-of-rio-de-janeiro-and-ibm-collaborate-to-advance-emergency-response-system-access-to-real-time-information-empowers-citizens-133545433.html. Accessed Apr 09 2020. UR - https://www.prnewswire.com/news-releases/city-of-rio-de-janeiro-and-ibm-collaborate-to-advance-emergency-response-system-access-to-real-time-information-empowers-citizens-133545433.html ID - ref5 ER - TY - STD TI - Mclaughlin T. As shootings soar, Chicago police use technology to predict crime. 2017. https://www.reuters.com/article/us-chicago-police-technology/as-shootings-soar-chicago-police-use-technology-to-predict-crime-idUSKBN1AL08P. Accessed 08 Apr 2020. UR - https://www.reuters.com/article/us-chicago-police-technology/as-shootings-soar-chicago-police-use-technology-to-predict-crime-idUSKBN1AL08P ID - ref6 ER - TY - STD TI - The Register. Sweden ‘secretly blames’ hackers—not solar flares—for taking out air traffic control. The Register. 2018. https://www.theregister.co.uk/2016/04/12/sweden_suspects_russian_hackers_hit_air_traffic_control/. Accessed 03 Mar 2020. UR - https://www.theregister.co.uk/2016/04/12/sweden_suspects_russian_hackers_hit_air_traffic_control/ ID - ref7 ER - TY - STD TI - Case DU. Analysis of the cyber attack on the Ukrainian power grid. Electricity Information Sharing and Analysis Center (E-ISAC), vol. 388, 2016. ID - ref8 ER - TY - STD TI - Kraszewski K. SamSam and the Silent Battle of Atlanta. In: 2019 11th international conference on cyber conflict (CyCon), 2019. vol. 900, p. 1–16. ID - ref9 ER - TY - STD TI - Kan M. Ransomware strikes Baltimore’s 911 dispatch system. PCMag Asia. 2018. https://sea.pcmag.com/news/20374/ransomware-strikes-baltimores-911-dispatch-system. Accessed 04 Apr 2020. UR - https://sea.pcmag.com/news/20374/ransomware-strikes-baltimores-911-dispatch-system ID - ref10 ER - TY - BOOK AU - Mettler, K. PY - 2019 DA - 2019// TI - Somebody keeps hacking these Dallas road signs with messages about Donald Trump Bernie Sanders and Harambe the gorilla PB - WP Company CY - Washington, DC ID - Mettler2019 ER - TY - STD TI - Dallas warning sirens “set off by hacker”. BBC. 2017. ID - ref12 ER - TY - JOUR AU - Khan, R. AU - Kumar, P. AU - Jayakody, D. N. K. AU - Liyanage, M. PY - 2019 DA - 2019// TI - A survey on security and privacy of 5G technologies: potential solutions, recent advancements and future directions JO - IEEE Commun Surv Tutor VL - 22 UR - https://doi.org/10.1109/COMST.2019.2933899 DO - 10.1109/COMST.2019.2933899 ID - Khan2019 ER - TY - STD TI - Chan L, et al. Survey of AI in cybersecurity for information technology management. In: 2019 IEEE technology & engineering management conference (TEMSCON). 2019. p. 1–8. ID - ref14 ER - TY - CHAP AU - Druzdzel, M. J. AU - Flynn, R. R. PY - 2017 DA - 2017// TI - Decision support systems BT - Encyclopedia of library and information sciences PB - CRC Press CY - Boca Raton ID - Druzdzel2017 ER - TY - JOUR AU - Ijaz, S. AU - Shah, M. A. AU - Khan, A. AU - Ahmed, M. PY - 2016 DA - 2016// TI - Smart cities: a survey on security concerns JO - Int J Adv Comput Sci Appl VL - 7 ID - Ijaz2016 ER - TY - JOUR AU - Gharaibeh, A. PY - 2017 DA - 2017// TI - Smart cities: a survey on data management, security, and enabling technologies JO - IEEE Commun Surv Tutor VL - 19 UR - https://doi.org/10.1109/COMST.2017.2736886 DO - 10.1109/COMST.2017.2736886 ID - Gharaibeh2017 ER - TY - JOUR AU - Silva, B. N. AU - Khan, M. AU - Han, K. PY - 2018 DA - 2018// TI - Towards sustainable smart cities: a review of trends, architectures, components, and open challenges in smart cities JO - Sustain Cities Soc VL - 38 UR - https://doi.org/10.1016/j.scs.2018.01.053 DO - 10.1016/j.scs.2018.01.053 ID - Silva2018 ER - TY - JOUR AU - Baig, Z. A. PY - 2017 DA - 2017// TI - Future challenges for smart cities: cyber-security and digital forensics JO - Digit Investig VL - 22 UR - https://doi.org/10.1016/j.diin.2017.06.015 DO - 10.1016/j.diin.2017.06.015 ID - Baig2017 ER - TY - JOUR AU - Cui, L. AU - Xie, G. AU - Qu, Y. AU - Gao, L. AU - Yang, Y. PY - 2018 DA - 2018// TI - Security and privacy in smart cities: challenges and opportunities JO - IEEE Access VL - 6 UR - https://doi.org/10.1109/ACCESS.2018.2853985 DO - 10.1109/ACCESS.2018.2853985 ID - Cui2018 ER - TY - JOUR AU - Sookhak, M. AU - Tang, H. AU - He, Y. AU - Yu, F. R. PY - 2019 DA - 2019// TI - Security and privacy of smart cities: a survey, research issues and challenges JO - IEEE Commun Surv Tutor VL - 21 UR - https://doi.org/10.1109/COMST.2018.2867288 DO - 10.1109/COMST.2018.2867288 ID - Sookhak2019 ER - TY - JOUR AU - Talari, S. AU - Shafie-Khah, M. AU - Siano, P. AU - Loia, V. AU - Tommasetti, A. AU - Catalão, J. P. PY - 2017 DA - 2017// TI - A review of smart cities based on the internet of things concept JO - Energies VL - 10 UR - https://doi.org/10.3390/en10040421 DO - 10.3390/en10040421 ID - Talari2017 ER - TY - STD TI - Banerjee J, Das A, Sen A. A survey of interdependency models for critical infrastructure networks. ArXiv Prepr. ArXiv170205407. 2017. ID - ref23 ER - TY - JOUR AU - Tøndel, I. A. AU - Foros, J. AU - Kilskar, S. S. AU - Hokstad, P. AU - Jaatun, M. G. PY - 2018 DA - 2018// TI - Interdependencies and reliability in the combined ICT and power system: an overview of current research JO - Appl Comput Inform VL - 14 UR - https://doi.org/10.1016/j.aci.2017.01.001 DO - 10.1016/j.aci.2017.01.001 ID - Tøndel2018 ER - TY - JOUR AU - Kitchin, R. AU - Dodge, M. PY - 2019 DA - 2019// TI - The (in) security of smart cities: vulnerabilities, risks, mitigation, and prevention JO - J Urban Technol VL - 26 UR - https://doi.org/10.1080/10630732.2017.1408002 DO - 10.1080/10630732.2017.1408002 ID - Kitchin2019 ER - TY - JOUR AU - Vitunskaite, M. AU - He, Y. AU - Brandstetter, T. AU - Janicke, H. PY - 2019 DA - 2019// TI - Smart cities and cyber security: are we there yet? A comparative study on the role of standards, third party risk management and security ownership JO - Comput Secur VL - 83 UR - https://doi.org/10.1016/j.cose.2019.02.009 DO - 10.1016/j.cose.2019.02.009 ID - Vitunskaite2019 ER - TY - JOUR AU - Habibzadeh, H. AU - Nussbaum, B. H. AU - Anjomshoa, F. AU - Kantarci, B. AU - Soyata, T. PY - 2019 DA - 2019// TI - A survey on cybersecurity, data privacy, and policy issues in cyber-physical system deployments in smart cities JO - Sustain Cities Soc VL - 50 UR - https://doi.org/10.1016/j.scs.2019.101660 DO - 10.1016/j.scs.2019.101660 ID - Habibzadeh2019 ER - TY - JOUR AU - Mehmood, Y. AU - Ahmad, F. AU - Yaqoob, I. AU - Adnane, A. AU - Imran, M. AU - Guizani, S. PY - 2017 DA - 2017// TI - Internet-of-things-based smart cities: recent advances and challenges JO - IEEE Commun Mag VL - 55 UR - https://doi.org/10.1109/MCOM.2017.1600514 DO - 10.1109/MCOM.2017.1600514 ID - Mehmood2017 ER - TY - STD TI - Galluscio M, et al. A first empirical look on internet-scale exploitations of IoT devices. In: 2017 IEEE 28th annual international symposium on personal, indoor, and mobile radio communications (PIMRC). 2017. p. 1–7. ID - ref29 ER - TY - STD TI - Ercolani VJ, Patton MW, Chen H. Shodan visualized. In: 2016 IEEE conference on intelligence and security informatics (ISI). 2016. p. 193–5. ID - ref30 ER - TY - STD TI - Patton M, Gross E, Chinn R, Forbis S, Walker L, Chen H. Uninvited connections: a study of vulnerable devices on the internet of things (IoT). In: 2014 IEEE joint intelligence and security informatics conference. 2014. p. 232–5. ID - ref31 ER - TY - STD TI - PALO ALTO NETWORKS. Impacts of cyberattacks on IoT devices. https://www.sdxcentral.com/wp-content/uploads/2019/10/iot-research-paper-v4_final.pdf. Accessed 04 Apr 2020. UR - https://www.sdxcentral.com/wp-content/uploads/2019/10/iot-research-paper-v4_final.pdf ID - ref32 ER - TY - JOUR AU - Sicato, S. AU - Costa, J. AU - Sharma, P. K. AU - Loia, V. AU - Park, J. H. PY - 2019 DA - 2019// TI - VPNFilter malware analysis on cyber threat in smart home network JO - Appl Sci VL - 9 UR - https://doi.org/10.3390/app9132763 DO - 10.3390/app9132763 ID - Sicato2019 ER - TY - JOUR AU - Zimba, A. AU - Wang, Z. AU - Mulenga, M. PY - 2019 DA - 2019// TI - Cryptojacking injection: a paradigm shift to cryptocurrency-based web-centric internet attacks JO - J Organ Comput Electron Commer VL - 29 UR - https://doi.org/10.1080/10919392.2019.1552747 DO - 10.1080/10919392.2019.1552747 ID - Zimba2019 ER - TY - JOUR AU - Bou-Harb, E. AU - Debbabi, M. AU - Assi, C. PY - 2016 DA - 2016// TI - A novel cyber security capability: inferring internet-scale infections by correlating malware and probing activities JO - Comput Netw VL - 94 UR - https://doi.org/10.1016/j.comnet.2015.11.004 DO - 10.1016/j.comnet.2015.11.004 ID - Bou-Harb2016 ER - TY - JOUR AU - Bertino, E. AU - Islam, N. PY - 2017 DA - 2017// TI - Botnets and internet of things security JO - Computer VL - 50 UR - https://doi.org/10.1109/MC.2017.62 DO - 10.1109/MC.2017.62 ID - Bertino2017 ER - TY - STD TI - Kumar M. DDoS attack takes down central heating system amidst winter in Finland. The Hacker News. 2016. https://thehackernews.com/2016/11/heating-system-hacked.html. Accessed 04 Apr 2020. UR - https://thehackernews.com/2016/11/heating-system-hacked.html ID - ref37 ER - TY - JOUR AU - Trappe, W. AU - Howard, R. AU - Moore, R. S. PY - 2015 DA - 2015// TI - Low-energy security: limits and opportunities in the internet of things JO - IEEE Secur Priv VL - 13 UR - https://doi.org/10.1109/MSP.2015.7 DO - 10.1109/MSP.2015.7 ID - Trappe2015 ER - TY - JOUR AU - Georgiou, K. AU - Xavier-de-Souza, S. AU - Eder, K. PY - 2017 DA - 2017// TI - The IoT energy challenge: a software perspective JO - IEEE Embed Syst Lett VL - 10 UR - https://doi.org/10.1109/LES.2017.2741419 DO - 10.1109/LES.2017.2741419 ID - Georgiou2017 ER - TY - JOUR AU - Mohurle, S. AU - Patil, M. PY - 2017 DA - 2017// TI - A brief study of wannacry threat: ransomware attack 2017 JO - Int J Adv Res Comput Sci UR - https://doi.org/10.26483/IJARCS.V8I5.4021 DO - 10.26483/IJARCS.V8I5.4021 ID - Mohurle2017 ER - TY - STD TI - Ransomware attack on San Francisco public transit gives everyone a free ride. The Guardian. 2016. https://www.theguardian.com/technology/2016/nov/28/passengers-free-ride-san-francisco-muni-ransomeware. Accessed 25 Apr 2020. UR - https://www.theguardian.com/technology/2016/nov/28/passengers-free-ride-san-francisco-muni-ransomeware ID - ref41 ER - TY - JOUR AU - Liu, Y. AU - Ning, P. AU - Reiter, M. K. PY - 2011 DA - 2011// TI - False data injection attacks against state estimation in electric power grids JO - ACM Trans Inf Syst Secur TISSEC VL - 14 UR - https://doi.org/10.1145/1952982.1952995 DO - 10.1145/1952982.1952995 ID - Liu2011 ER - TY - JOUR AU - Liang, G. AU - Zhao, J. AU - Luo, F. AU - Weller, S. R. AU - Dong, Z. Y. PY - 2016 DA - 2016// TI - A review of false data injection attacks against modern power systems JO - IEEE Trans Smart Grid VL - 8 UR - https://doi.org/10.1109/TSG.2015.2495133 DO - 10.1109/TSG.2015.2495133 ID - Liang2016 ER - TY - STD TI - Wurm J, Hoang K, Arias O, Sadeghi AR, Jin Y. Security analysis on consumer and industrial IoT devices. In: 2016 21st Asia and South Pacific design automation conference (ASP-DAC). 2016. p. 519–24. ID - ref44 ER - TY - JOUR AU - Zoonen, L. PY - 2016 DA - 2016// TI - Privacy concerns in smart cities JO - Gov Inf Q VL - 33 UR - https://doi.org/10.1016/j.giq.2016.06.004 DO - 10.1016/j.giq.2016.06.004 ID - Zoonen2016 ER - TY - STD TI - Usama M, Asim M, Latif S, Qadir J, et al. Generative adversarial networks for launching and thwarting adversarial attacks on network intrusion detection systems. In: 2019 15th international wireless communications & mobile computing conference (IWCMC). 2019. p. 78–83. ID - ref46 ER - TY - STD TI - Lin P, Swimmer M, Urano A, Hilt S, ve Vosseler R (2017) Securing smart cities moving toward utopia with security in mind. A TrendLabs Research Paper, Erişim Tarihi: 15 Eylül 2019 [Online]. https://documents.trendmicro.com/assets/wp/wp-securing-smart-cities.pdf. Accessed 15 June 2020. UR - https://documents.trendmicro.com/assets/wp/wp-securing-smart-cities.pdf ID - ref47 ER - TY - JOUR AU - Laugé, A. AU - Hernantes, J. AU - Sarriegi, J. M. PY - 2015 DA - 2015// TI - Critical infrastructure dependencies: a holistic, dynamic and quantitative approach JO - Int J Crit Infrastruct Prot VL - 8 UR - https://doi.org/10.1016/j.ijcip.2014.12.004 DO - 10.1016/j.ijcip.2014.12.004 ID - Laugé2015 ER - TY - JOUR AU - König, S. AU - Rass, S. PY - 2018 DA - 2018// TI - Investigating stochastic dependencies between critical infrastructures JO - Int J Adv Syst Meas VL - 11 ID - König2018 ER - TY - JOUR AU - Stergiopoulos, G. AU - Kotzanikolaou, P. AU - Theocharidou, M. AU - Gritzalis, D. PY - 2015 DA - 2015// TI - Risk mitigation strategies for critical infrastructures based on graph centrality analysis JO - Int J Crit Infrastruct Prot VL - 10 UR - https://doi.org/10.1016/j.ijcip.2015.05.003 DO - 10.1016/j.ijcip.2015.05.003 ID - Stergiopoulos2015 ER - TY - JOUR AU - Stergiopoulos, G. AU - Kotzanikolaou, P. AU - Theocharidou, M. AU - Lykou, G. AU - Gritzalis, D. PY - 2016 DA - 2016// TI - Time-based critical infrastructure dependency analysis for large-scale and cross-sectoral failures JO - Int J Crit Infrastruct Prot VL - 12 UR - https://doi.org/10.1016/j.ijcip.2015.12.002 DO - 10.1016/j.ijcip.2015.12.002 ID - Stergiopoulos2016 ER - TY - JOUR AU - Beccuti, M. AU - Chiaradonna, S. AU - Giandomenico, F. AU - Donatelli, S. AU - Dondossola, G. AU - Franceschinis, G. PY - 2012 DA - 2012// TI - Quantification of dependencies between electrical and information infrastructures JO - Int J Crit Infrastruct Prot VL - 5 UR - https://doi.org/10.1016/j.ijcip.2012.01.003 DO - 10.1016/j.ijcip.2012.01.003 ID - Beccuti2012 ER - TY - JOUR AU - Bloomfield, R. E. AU - Popov, P. AU - Salako, K. AU - Stankovic, V. AU - Wright, D. PY - 2017 DA - 2017// TI - Preliminary interdependency analysis: an approach to support critical-infrastructure risk-assessment JO - Reliab Eng Syst Saf VL - 167 UR - https://doi.org/10.1016/j.ress.2017.05.030 DO - 10.1016/j.ress.2017.05.030 ID - Bloomfield2017 ER - TY - STD TI - Netkachov O, Popov P, Salako K. Quantification of the impact of cyber attack in critical infrastructures. In: International conference on computer safety, reliability, and security. 2014. p. 316–27. ID - ref54 ER - TY - JOUR AU - Johansen, C. AU - Tien, I. PY - 2018 DA - 2018// TI - Probabilistic multi-scale modeling of interdependencies between critical infrastructure systems for resilience JO - Sustain Resilient Infrastruct VL - 3 UR - https://doi.org/10.1080/23789689.2017.1345253 DO - 10.1080/23789689.2017.1345253 ID - Johansen2018 ER - TY - JOUR AU - Heracleous, C. AU - Kolios, P. AU - Panayiotou, C. G. AU - Ellinas, G. AU - Polycarpou, M. M. PY - 2017 DA - 2017// TI - Hybrid systems modeling for critical infrastructures interdependency analysis JO - Reliab Eng Syst Saf VL - 165 UR - https://doi.org/10.1016/j.ress.2017.03.028 DO - 10.1016/j.ress.2017.03.028 ID - Heracleous2017 ER - TY - STD TI - Ferdowsi A, Saad W, Maham B, Mandayam NB. A Colonel Blotto game for interdependence-aware cyber-physical systems security in smart cities. In: Proceedings of the 2nd international workshop on science of smart city operations and platforms engineering. 2017. p. 7–12. ID - ref57 ER - TY - JOUR AU - Li, Z. AU - Jin, D. AU - Hannon, C. AU - Shahidehpour, M. AU - Wang, J. PY - 2016 DA - 2016// TI - Assessing and mitigating cybersecurity risks of traffic light systems in smart cities JO - IET Cyber Phys Syst Theory Appl VL - 1 ID - Li2016 ER - TY - JOUR AU - Kelarestaghi, K. B. AU - Foruhandeh, M. AU - Heaslip, K. AU - Gerdes, R. PY - 2019 DA - 2019// TI - Intelligent transportation system security: impact-oriented risk assessment of in-vehicle networks JO - IEEE Intell Transp Syst Mag UR - https://doi.org/10.1109/MITS.2018.2889714 DO - 10.1109/MITS.2018.2889714 ID - Kelarestaghi2019 ER - TY - JOUR AU - Kotzanikolaou, P. AU - Theoharidou, M. AU - Gritzalis, D. PY - 2013 DA - 2013// TI - Assessing n-order dependencies between critical infrastructures JO - Int J Crit Infrastruct VL - 9 UR - https://doi.org/10.1504/IJCIS.2013.051606 DO - 10.1504/IJCIS.2013.051606 ID - Kotzanikolaou2013 ER - TY - JOUR AU - Neshenko, N. AU - Bou-Harb, E. AU - Crichigno, J. AU - Kaddoum, G. AU - Ghani, N. PY - 2019 DA - 2019// TI - Demystifying IoT security: an exhaustive survey on IoT vulnerabilities and a first empirical look on internet-scale IoT exploitations JO - IEEE Commun Surv Tutor VL - 21 UR - https://doi.org/10.1109/COMST.2019.2910750 DO - 10.1109/COMST.2019.2910750 ID - Neshenko2019 ER - TY - JOUR AU - Sicari, S. AU - Rizzardi, A. AU - Miorandi, D. AU - Coen-Porisini, A. PY - 2018 DA - 2018// TI - A risk assessment methodology for the internet of things JO - Comput Commun VL - 129 UR - https://doi.org/10.1016/j.comcom.2018.07.024 DO - 10.1016/j.comcom.2018.07.024 ID - Sicari2018 ER - TY - JOUR AU - Wang, H. AU - Chen, Z. AU - Zhao, J. AU - Di, X. AU - Liu, D. PY - 2018 DA - 2018// TI - A vulnerability assessment method in industrial internet of things based on attack graph and maximum flow JO - IEEE Access VL - 6 UR - https://doi.org/10.1109/ACCESS.2018.2805690 DO - 10.1109/ACCESS.2018.2805690 ID - Wang2018 ER - TY - JOUR AU - Mell, P. AU - Scarfone, K. AU - Romanosky, S. PY - 2006 DA - 2006// TI - Common vulnerability scoring system JO - IEEE Secur Priv VL - 4 UR - https://doi.org/10.1109/MSP.2006.145 DO - 10.1109/MSP.2006.145 ID - Mell2006 ER - TY - JOUR AU - Radanliev, P. PY - 2018 DA - 2018// TI - Future developments in cyber risk assessment for the internet of things JO - Comput Ind VL - 102 UR - https://doi.org/10.1016/j.compind.2018.08.002 DO - 10.1016/j.compind.2018.08.002 ID - Radanliev2018 ER - TY - JOUR AU - Mohammad, N. PY - 2019 DA - 2019// TI - A multi-tiered defense model for the security analysis of critical facilities in smart cities JO - IEEE Access VL - 7 UR - https://doi.org/10.1109/ACCESS.2019.2947638 DO - 10.1109/ACCESS.2019.2947638 ID - Mohammad2019 ER - TY - STD TI - Shivraj V, Rajan M, Balamuralidhar P. A graph theory based generic risk assessment framework for internet of things (IoT). In: 2017 IEEE international conference on advanced networks and telecommunications systems (ANTS). 2017. p. 1–6. ID - ref67 ER - TY - JOUR AU - Mohsin, M. AU - Sardar, M. U. AU - Hasan, O. AU - Anwar, Z. PY - 2017 DA - 2017// TI - IoTRiskAnalyzer: a probabilistic model checking based framework for formal risk analytics of the internet of things JO - IEEE Access VL - 5 UR - https://doi.org/10.1109/ACCESS.2017.2696031 DO - 10.1109/ACCESS.2017.2696031 ID - Mohsin2017 ER - TY - JOUR AU - Falco, G. AU - Viswanathan, A. AU - Caldera, C. AU - Shrobe, H. PY - 2018 DA - 2018// TI - A master attack methodology for an AI-based automated attack planner for smart cities JO - IEEE Access VL - 6 UR - https://doi.org/10.1109/ACCESS.2018.2867556 DO - 10.1109/ACCESS.2018.2867556 ID - Falco2018 ER - TY - STD TI - Angelini M, Santucci G. Visual cyber situational awareness for critical infrastructures. In: Proceedings of the 8th international symposium on visual information communication and interaction. 2015. p. 83–92. ID - ref70 ER - TY - STD TI - Wang P, Ali A, Kelly W. Data security and threat modeling for smart city infrastructure. In: 2015 international conference on cyber security of smart cities, industrial control system and communications (SSIC), 2015. p. 1–6. https://doi.org/10.1109/SSIC.2015.7245322. ID - ref71 ER - TY - BOOK AU - Wang, S. P. AU - Ledley, R. S. PY - 2012 DA - 2012// TI - Computer architecture and security: fundamentals of designing secure computer systems PB - Wiley CY - New York UR - https://doi.org/10.1002/9781118168851 DO - 10.1002/9781118168851 ID - Wang2012 ER - TY - BOOK AU - Bou-Harb, E. AU - Neshenko, N. PY - 2020 DA - 2020// TI - Cyber threat intelligence for the internet of things PB - Springer CY - New York UR - https://doi.org/10.1007/978-3-030-45858-4 DO - 10.1007/978-3-030-45858-4 ID - Bou-Harb2020 ER - TY - STD TI - Naik DR, Das LB, Bindiya TS. Wireless sensor networks with Zigbee and WiFi for environment monitoring, traffic management and vehicle monitoring in smart cities. In: 2018 IEEE 3rd international conference on computing, communication and security (ICCCS). 2018. p. 46–50. ID - ref74 ER - TY - STD TI - Dowling S, Schukat M, Melvin H. A ZigBee honeypot to assess IoT cyberattack behavior. In: 2017 28th Irish signals and systems conference (ISSC). 2017. p. 1–6. ID - ref75 ER - TY - STD TI - Oza P, Foruhandeh M, Gerdes R, Chantem T. Secure traffic lights: replay attack detection for model-based smart traffic controllers. In: Proceedings of the second ACM workshop on automotive and aerial vehicle security. 2020. p. 5–10. ID - ref76 ER - TY - JOUR AU - He, Y. AU - Mendis, G. J. AU - Wei, J. PY - 2017 DA - 2017// TI - Real-time detection of false data injection attacks in smart grid: a deep learning-based intelligent mechanism JO - IEEE Trans Smart Grid VL - 8 UR - https://doi.org/10.1109/TSG.2017.2703842 DO - 10.1109/TSG.2017.2703842 ID - He2017 ER - TY - JOUR AU - Azmoodeh, A. AU - Dehghantanha, A. AU - Choo, K. -. K. R. PY - 2018 DA - 2018// TI - Robust malware detection for internet of (battlefield) things devices using deep Eigenspace learning JO - IEEE Trans Sustain Comput VL - 4 UR - https://doi.org/10.1109/TSUSC.2018.2809665 DO - 10.1109/TSUSC.2018.2809665 ID - Azmoodeh2018 ER - TY - JOUR AU - Dovom, E. M. AU - Azmoodeh, A. AU - Dehghantanha, A. AU - Newton, D. E. AU - Parizi, R. M. AU - Karimipour, H. PY - 2019 DA - 2019// TI - Fuzzy pattern tree for edge malware detection and categorization in IoT JO - J Syst Archit VL - 97 UR - https://doi.org/10.1016/j.sysarc.2019.01.017 DO - 10.1016/j.sysarc.2019.01.017 ID - Dovom2019 ER - TY - STD TI - Kumar A, Lim TJ. EDIMA: early detection of IoT malware network activity using machine learning techniques. In: 2019 IEEE 5th world forum on internet of things (WF-IoT). 2019. p. 289–94. https://doi.org/10.1109/WF-IoT.2019.8767194. ID - ref80 ER - TY - JOUR AU - Meidan, Y. PY - 2018 DA - 2018// TI - N-baiot—network-based detection of IoT botnet attacks using deep autoencoders JO - IEEE Pervasive Comput VL - 17 UR - https://doi.org/10.1109/MPRV.2018.03367731 DO - 10.1109/MPRV.2018.03367731 ID - Meidan2018 ER - TY - JOUR AU - Alazab, V. R. M. AU - Srinivasan, S. AU - Pham, Q. AU - Padannayil, S. K. AU - Simran, K. PY - 2020 DA - 2020// TI - A visualized botnet detection system based deep learning for the internet of things networks of smart cities JO - IEEE Trans Ind Appl UR - https://doi.org/10.1109/TIA.2020.2971952 DO - 10.1109/TIA.2020.2971952 ID - Alazab2020 ER - TY - JOUR AU - Raza, S. AU - Wallgren, L. AU - Voigt, T. PY - 2013 DA - 2013// TI - SVELTE: real-time intrusion detection in the internet of things JO - Ad Hoc Netw VL - 11 UR - https://doi.org/10.1016/j.adhoc.2013.04.014 DO - 10.1016/j.adhoc.2013.04.014 ID - Raza2013 ER - TY - STD TI - Shreenivas D, Raza S, Voigt T. Intrusion detection in the RPL-connected 6LoWPAN networks. In: Proceedings of the 3rd ACM international workshop on IoT privacy, trust, and security. 2017. p. 31–8. ID - ref84 ER - TY - STD TI - Li D, Chen D, Goh J, Ng S. Anomaly detection with generative adversarial networks for multivariate time series. ArXiv Prepr. ArXiv180904758. 2018. ID - ref85 ER - TY - JOUR AU - Azmoodeh, A. AU - Dehghantanha, A. AU - Conti, M. AU - Choo, K. -. K. R. PY - 2018 DA - 2018// TI - Detecting crypto-ransomware in IoT networks based on energy consumption footprint JO - J Ambient Intell Humaniz Comput VL - 9 UR - https://doi.org/10.1007/s12652-017-0558-5 DO - 10.1007/s12652-017-0558-5 ID - Azmoodeh2018 ER - TY - STD TI - Baracaldo N, Chen B, Ludwig H, Safavi A, Zhang R. Detecting poisoning attacks on machine learning in IoT environments. In: 2018 IEEE international congress on internet of things (ICIOT). 2018. p. 57–64. ID - ref87 ER - TY - STD TI - Laishram R, Phoha VV. Curie: a method for protecting SVM classifier from poisoning attack. ArXiv Prepr. ArXiv160601584. 2016. ID - ref88 ER - TY - BOOK AU - Goodfellow, I. AU - Bengio, Y. AU - Courville, A. PY - 2016 DA - 2016// TI - Deep learning PB - MIT Press CY - Cambridge ID - Goodfellow2016 ER - TY - STD TI - Hinton GE. Deep belief nets. 2010. ID - ref90 ER - TY - JOUR AU - Senge, R. AU - Hüllermeier, E. PY - 2015 DA - 2015// TI - Fast fuzzy pattern tree learning for classification JO - IEEE Trans Fuzzy Syst VL - 23 UR - https://doi.org/10.1109/TFUZZ.2015.2396078 DO - 10.1109/TFUZZ.2015.2396078 ID - Senge2015 ER - TY - CHAP AU - Goodfellow, I. PY - 2014 DA - 2014// TI - Generative adversarial nets BT - Advances in neural information processing systems PB - MIT Press CY - Cambridge ID - Goodfellow2014 ER - TY - CHAP AU - Edelkamp, S. AU - Schrödl, S. ED - Edelkamp, S. ED - Schrödl, S. PY - 2012 DA - 2012// TI - Chapter 1—Introduction BT - Heuristic search PB - Morgan Kaufmann CY - San Francisco UR - https://doi.org/10.1016/B978-0-12-372512-7.00001-8 DO - 10.1016/B978-0-12-372512-7.00001-8 ID - Edelkamp2012 ER - TY - STD TI - Sanders WH, Meyer JF. Stochastic activity networks: formal definitions and concepts. In: School organized by the European Educational Forum. 2000. p. 315–43. ID - ref94 ER - TY - JOUR AU - Chiola, G. AU - Dutheillet, C. AU - Franceschinis, G. AU - Haddad, S. PY - 1993 DA - 1993// TI - Stochastic well-formed colored nets and symmetric modeling applications JO - IEEE Trans Comput VL - 42 UR - https://doi.org/10.1109/12.247838 DO - 10.1109/12.247838 ID - Chiola1993 ER - TY - BOOK AU - David, H. A. AU - Moeschberger, M. L. PY - 1978 DA - 1978// TI - The theory of competing risks PB - Charles Griffin and Company CY - London ID - David1978 ER - TY - STD TI - Dondossola G, Garrone G, Szanto J, Deconinck G, Loix T, Beitollahi H. ICT resilience of power control systems: experimental results from the CRUTIAL testbeds. In: 2009 IEEE/IFIP international conference on dependable systems & networks. 2009. p. 554–9. ID - ref97 ER - TY - STD TI - Goh J, Adepu S, Junejo KN, Mathur A. A dataset to support research in the design of secure water treatment systems. In: International conference on critical information infrastructures security. 2016. p. 88–99. ID - ref98 ER - TY - STD TI - Shodan® [Online]. http://shodan.io. Accessed 5 Mar 2020. UR - http://shodan.io ID - ref99 ER - TY - STD TI - UCSD network telescope—near-real-time network telescope dataset. https://www.caida.org/data/passive/telescope-near-real-time_dataset.xml. Accessed 05 Mar 2020. UR - http://www.caida.org/data/passive/telescope-near-real-time_dataset.xml ID - ref100 ER - TY - JOUR AU - Rinaldi, S. M. AU - Peerenboom, J. P. AU - Kelly, T. K. PY - 2001 DA - 2001// TI - Identifying, understanding, and analyzing critical infrastructure interdependencies JO - IEEE Control Syst Mag VL - 21 UR - https://doi.org/10.1109/37.969131 DO - 10.1109/37.969131 ID - Rinaldi2001 ER - TY - JOUR AU - Shameli-Sendi, A. AU - Aghababaei-Barzegar, R. AU - Cheriet, M. PY - 2016 DA - 2016// TI - Taxonomy of information security risk assessment (ISRA) JO - Comput Secur VL - 57 UR - https://doi.org/10.1016/j.cose.2015.11.001 DO - 10.1016/j.cose.2015.11.001 ID - Shameli-Sendi2016 ER - TY - JOUR AU - Aven, T. AU - Heide, B. PY - 2009 DA - 2009// TI - Reliability and validity of risk analysis JO - Reliab Eng Syst Saf VL - 94 UR - https://doi.org/10.1016/j.ress.2009.06.003 DO - 10.1016/j.ress.2009.06.003 ID - Aven2009 ER - TY - JOUR AU - Nurse, J. R. C. AU - Creese, S. AU - Roure, D. D. PY - 2017 DA - 2017// TI - Security risk assessment in internet of things systems JO - IT Prof VL - 19 UR - https://doi.org/10.1109/MITP.2017.3680959 DO - 10.1109/MITP.2017.3680959 ID - Nurse2017 ER - TY - JOUR AU - Xin, Y. PY - 2018 DA - 2018// TI - Machine learning and deep learning methods for cybersecurity JO - IEEE Access VL - 6 UR - https://doi.org/10.1109/ACCESS.2018.2836950 DO - 10.1109/ACCESS.2018.2836950 ID - Xin2018 ER - TY - JOUR AU - Thomas, J. J. AU - Cook, K. A. PY - 2006 DA - 2006// TI - A visual analytics agenda JO - IEEE Comput Graph Appl VL - 26 UR - https://doi.org/10.1109/MCG.2006.5 DO - 10.1109/MCG.2006.5 ID - Thomas2006 ER -