1 |
Gabrielli do Livramento Goncalves, Walter Leal Filho, Samara da Silva Neiva et al., "The Impacts of the Fourth Industrial Revolution on Smart and Sustainable Cities," Sustainability, 2021.
|
2 |
Erik Feyen, Jon Frost, Leonardo Gambacorta et al., "Fintech and the digital transformation of financial services: implications for market structure and public policy," Bank for International Settlements, pp. 1000-1004, 2021.
|
3 |
Machkour, Badr, and Ahmed Abriane. , "Industry 4.0 and its Implications for the Financial Sector," Elservier B.V., pp. 496-502, 2020.
|
4 |
V Fremont, "The Digital Transformation of the Manufacturing Industry," Vincent Fremont, Oct. 2021.
|
5 |
Rafat Mahmood1 and Michael Jetter, "Communications Technology and Terrorism," Journal of Conflict Resolution, pp. 127-166, 2020.
|
6 |
"United Nations Security Council Counter-Terrorism Committee Executive Directorate: Information and Communications Technologies," UN Security Council, 2021.
|
7 |
Robert Graham, "How Terrorists Use Encryption," CTS(Comating Terrorism Center at West Point), vol. 37, no. 4, pp. 20-25, Jun. 2016.
|
8 |
"우리 집 거실 훤히 '월패드 해킹'...똑똑한 아파트일수록 불안 커진다," 한국일보, 2021, https://www.hankookilbo.com/News/Read/A2021120915500002964
|
9 |
Mahmudul Hasan, Milon Islam, Ishrak Islam Zarif, Hashem, "Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches," Internet of Things, 2019.
|
10 |
Fahiba Farhin; Ishrat Sultana; Nahida Islam; M Shamim Kaiser; Md. Sazzadur Rahman; Mufti Mahmud, "Attack Detection in Internet of Things using Software Defined Network and Fuzzy Neural Network," 2020 Joint 9th International Conference on Informatics, 2021.
|
11 |
Vasily Desnitsky, Andrey Chechulin, Igor Kotenko, "Multi-Aspect Based Approach to Attack Detection in IoT Clouds," PubMed Central, 2022.
|
12 |
Gauthama Raman M. R., Chuadhry Mujeeb Ahmed & Aditya Mathur "Machine learning for intrusion detection in industrial control systems: challenges and lessons from experimental evaluation," Cybersecurity. springeropen, 2021
|
13 |
Mohamad Kaouk; Jean-Marie Flaus; Marie-Laure Potet; Roland Groz, "A Review of Intrusion Detection Systems for Industrial Control Systems," 2019 6th International Conference on Control, Decision and Information Technologies (CoDIT), 2019.
|
14 |
Hussain Ahmad, Isuru Dharmadasa, Faheem Ullah, M. Ali Babar, "A Review on C3I Systems' Security: Vulnerabilities, Attacks, and Countermeasures," Cornell University, 2021.
|
15 |
Bernard Marr, "The Top 10 Technology Trends Of The 4th Industrial Revolution," Forbes, 2020.
|
16 |
Sean Lyngaas, "Universal Health Services reports $67 million in losses after apparent ransomware attack," Sophos Endpoint Cybersecurity, 2021.
|
17 |
"사회기반시설에 대한 민간투자법," 기획재정부, 2021.
|
18 |
"The Critical Importance of Endpoint Management and Security," TBConsulting, 2020.
|
19 |
"Wikipedia," 2022, https://en.wikipedia.org/wiki/Society
|
20 |
"FIWARE," FIWARE Foundation, 2021, https://www.fiware.org/
|
21 |
"Gartner's 8 Cybersecurity Predictions for 2023-2025,",2022, https://krontech.com/gartners-8-cybersecurity-predictions-for-2023-2025.
|
22 |
Dominic Endicott, John Sviokla, "Facing up to a four-generation society,"strategy&, 2022, https://www.strategy-business.com/aricle/Facing-Up-to-a-Four-Generation-Society
|
23 |
Klaus Schwab, "The Fourth Industrial Revolution: what it means, how to respond," WORLD ECONOMIC FORUM, 2016, https://www.weforum.org/agenda/2016/01/the-fourth-industrial-revolution-what-it-means-and-how-to-respond/
|
24 |
Matthew J. Kalas, "Drones Aren't Just Hackers' Targets - They're Hackers' Weapons," Locke Lord, 2020, https://www.lockelord.com/newsandevents/publications/2020/07/drones-arent-just-hackers-targets.
|
25 |
Patrick Howell O'Neillarchive page, "These hackers showed just how easy it is to target critical infrastructure," 2022, https://www.technologyreview.com/2022/04/21/1050815/hackers-target-critical-infrastructure-pwn2own/
|
26 |
Andres Munoz-Arcentales, Sonsoles Lopez-Pernas, Alejandro Pozo, Alvaro Alonso, Joaquin Salvachua and Gabriel Huecas, "Data Usage and Access Control in Industrial Data Spaces: Implementation Using FIWARE," Sustainability, 2020.
|
27 |
Stamford, "Gartner Predicts By 2025 Cyber Attackers Will Have Weaponized Operational Technology Environments to Successfully Harm or Kill Humans," Gartner, 2021.
|
28 |
Robert M. Lee, Michalel J. Assante, Tim Conway, "Analysis of the Cyber Attack on the Ukrainian Power Grid," Electricity Information Sharing and Analysis Center, 2016.
|
29 |
Andre Kudelski, "The dark side of the Fourth Industrial Revolution," World Economic Forum, 2016.
|
30 |
Goiuri Peralta, Raul G. Cid-Fuentes, Josu Bilbao and Pedro M. Crespo, "Network Coding-Based Next-Generation IoT for Industry 4.0," Intechopen, 2017.
|
31 |
Mohd Javaid, Abid Haleem, Ravi PratapSingh, Shanay Rab, Rajiv Suman, "Significance of sensors for industry 4.0: Roles, capabilities, and applications," ScienceDirect, 2021.
|
32 |
Vidar, "Google's Quantum Computer Is About 158 Million Times Faster Than the World's Fastest Supercomputer," Published in Predict, 2021.
|
33 |
Michal Krelina, "Quantum Technology for Military Applications," arXiv:2103.12548v2, 2021.
DOI
|
34 |
Amyas Morse, "Investigation: WannaCry cyber attack and the NHS," National Audit Office, 2017.
|
35 |
Kenneth B Medlock, "The Colonial Pipeline Outage: An Important Lesson For US Energy Security," Forbes, 2021.
|
36 |
Andy Greenberg, "A Hacker Tried to Poison a Florida City's Water Supply, Officials Say," WIRED, 2021.
|
37 |
Sandra Grabowska, "SMART FACTORIES IN THE AGE OF INDUSTRY 4.0 ," Management Systems in Production Engineering, vol. 28, no. 2, pp. 90-96, 2020.
DOI
|
38 |
Saheed Oladimeji, Sean Michael Kerner, "SolarWinds hack explained: Everything you need to know," TechTarget, 2021.
|
39 |
Pedoro Soto-Acosta, "COVID-19 Pandemic: Shifting Digital Transformation to a High-Speed Gear," Information Systems Management, vol. 37, no. 4, pp. 260-266, 2020.
DOI
|