cybersecurity chief warns of " market " in malware, 2009. ,
Panetta warns of dire threat of cyberattack on U.S, 2010. ,
Situational crime prevention, in Environmental Criminology and Crime Analysis, pp.178-194, 2008. ,
Social Change and Crime Rate Trends: A Routine Activity Approach, American Sociological Review, vol.44, issue.4, pp.588-609, 1979. ,
DOI : 10.2307/2094589
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.476.3696
Best practices in exploratory factory analysis: Four recommendations for getting the most from your analysis, Practical Assessment, Research and Evaluation, vol.10, issue.7, pp.173-178, 2005. ,
Discovering Statistics Using SPSS, 2013. ,
Exploratory factor analysis, in Encyclopedia of Measurement and Statistics, pp.332-335, 2007. ,
Mixing Qualitative and Quantitative Methods: Triangulation in Action, Administrative Science Quarterly, vol.24, issue.4, pp.602-611, 1979. ,
DOI : 10.2307/2392366
Advanced Persistent Threat, Santa Clara, California (blogs. mcafee.com/tag/advanced-persistent-threat) ,
Safeguarding IEDS, substations and SCADA systems against electronic intrusions, Proceedings of the Western Power Delivery Automation Conference, 2001. ,
Measurement, Design and Analysis: An Integrated Approach, 1991. ,
What is Qualitative Research? Melbourne, Australia (www.qsrinternational.com/what-is-qualitative-research ,
Cybercrimes against critical infrastructures: a study of online criminal organization and techniques, Criminal Justice Studies, vol.2, issue.3, pp.261-271, 2009. ,
DOI : 10.1353/sais.2004.0020
Offender decision-making in industrial control systems cybercrime , presented at the Cyber Infrastructure Protection Conference, 2012. ,
The U.S. needs a cybersecurity czar now, Bloomberg Businessweek, 2009. ,
URL : https://hal.archives-ouvertes.fr/in2p3-00012441
Guide to Industrial Control Systems (ICS) Security, NIST Special Publication 800-82, National Institute of Standards and Technology, 2012. ,
Cyberwar strategy and tactics: An analysis of cyber goals, strategies, tactics and techniques, Proceedings of the IEEE SMC Workshop on Information Assurance, pp.228-234, 2002. ,
Power-grid cyber attack seen leaving millions in dark for months, 2012. ,