Deliverable D3.1: White book: Emerging ICT threats, 2010. ,
Identifying, understanding, and analyzing critical infrastructure interdependencies, IEEE Control Systems Magazine, vol.21, issue.6, pp.11-25, 2001. ,
DOI : 10.1109/37.969131
Emerging cyber threats report for, 2008. ,
Draft guide to industrial control systems (ICS) security, 2008. ,
Security and privacy in sensor networks, Computer, vol.36, issue.10, pp.103-105, 2003. ,
DOI : 10.1109/MC.2003.1236475
Security in wireless sensor networks, Communications of the ACM, vol.47, issue.6, pp.53-57, 2004. ,
DOI : 10.1145/990680.990707
Interview about wireless devices adoption in the industry and the future trends, 2008. ,
Emerson first to offer WirelessHART automation products, 2008. ,
Industrial wireless implementation guide, Control Engineering, 2008. ,
Recommended practices guide for securing ZigBee wireless networks in process control system environments, Draft, 2007. ,
The National Infrastructure Advisory Council's final report and recommendations on the insider threat to critical infrastructures, 2008. ,
Insider threat study: Computer system sabotage in critical infrastructure sectors, Executive summary, 2005. ,
Securing legacy control systems, 2009. ,
Next generation networking (NGN all-IP) http://en.wikipedia.org/ wiki, 2008. ,
Cybersecurity & Communications (CS&C) overview, Technology trends, & challenges, 2008. ,
An efficient IP traceback mechanism for the NGN based on IPv6 Protocol, 2008. ,
Security technologies for NGN, 2007. ,
IP Bearer Network for NGN, 2005. ,