References
- Dalton, W., "RIM's BlackBerry phones may lose public sector monopoly," Retrieved 5/24/13, 2013, from http://www.itproportal.com/2012/08/24/rims-blackberry-phones-maylose-publicsector-monopoly-/, 2012.
- McGarry, B., "Pentagon Will Open Networks to Apple, Google Devices in 2014," Retrieved 3/21/13, 2013, from http://www.bloomberg.com/news/2013-02-26/pentagon-will-opennetworksto-apple-google-devices-in-2014.html, 2013.
- Gorman, S., et al., "Insurgents Hack U.S. Drones," The Wall Street Journal, WSJ.com, 2009.
- Nguyen, T. C., "Virus attacks military drones, exposes vulnerabilities." Retrieved from http://www.smartplanet.com/blog/thinking-tech/virus-attacks-militarydrones-exposes-vulnerabilities/8858, 2011.
- Paganini, P., "Hacking Drones Overview of the Main Threats," Retrieved from http://resources.infosecinstitute.com/hacking-drones-overviewof-themain-threats/, 2013.
- Nguyen, T. C., "How college students hijacked a government spy drone," Retrieved from http://www.smartplanet.com/blog/thinking-tech/how-college-studentshijacked- a-government-spy-drone/12214, 2012.
- Munoz, C., "Report: DOD opens door to Apple, Android-built systems," Retrieved from http://thehill.com/blogs/defconhill/ industry/265395-report-dod-opens-door-to-apple-android-builtsystems, 2013.
- Oh, T., et al., "Best security practices for android, blackberry, and iOS," Enabling Technologies for Smartphone and Internet of Things (ETSIoT), 2012.
- Goodwin, B., "IT manufacturers fight cyber espionage risks in the supply chain," Retrieved from http://www.computerweekly.com/news/2240181320/IT-manfucturerstackle-cyber-espionage-risks-in-the-supply-chain, 2013.