1 |
Dalton, W., "RIM's BlackBerry phones may lose public sector monopoly," Retrieved 5/24/13, 2013, from http://www.itproportal.com/2012/08/24/rims-blackberry-phones-maylose-publicsector-monopoly-/, 2012.
|
2 |
McGarry, B., "Pentagon Will Open Networks to Apple, Google Devices in 2014," Retrieved 3/21/13, 2013, from http://www.bloomberg.com/news/2013-02-26/pentagon-will-opennetworksto-apple-google-devices-in-2014.html, 2013.
|
3 |
Gorman, S., et al., "Insurgents Hack U.S. Drones," The Wall Street Journal, WSJ.com, 2009.
|
4 |
Nguyen, T. C., "Virus attacks military drones, exposes vulnerabilities." Retrieved from http://www.smartplanet.com/blog/thinking-tech/virus-attacks-militarydrones-exposes-vulnerabilities/8858, 2011.
|
5 |
Paganini, P., "Hacking Drones Overview of the Main Threats," Retrieved from http://resources.infosecinstitute.com/hacking-drones-overviewof-themain-threats/, 2013.
|
6 |
Nguyen, T. C., "How college students hijacked a government spy drone," Retrieved from http://www.smartplanet.com/blog/thinking-tech/how-college-studentshijacked- a-government-spy-drone/12214, 2012.
|
7 |
Munoz, C., "Report: DOD opens door to Apple, Android-built systems," Retrieved from http://thehill.com/blogs/defconhill/ industry/265395-report-dod-opens-door-to-apple-android-builtsystems, 2013.
|
8 |
Oh, T., et al., "Best security practices for android, blackberry, and iOS," Enabling Technologies for Smartphone and Internet of Things (ETSIoT), 2012.
|
9 |
Goodwin, B., "IT manufacturers fight cyber espionage risks in the supply chain," Retrieved from http://www.computerweekly.com/news/2240181320/IT-manfucturerstackle-cyber-espionage-risks-in-the-supply-chain, 2013.
|