1. L.A. Aguilar, The need for greater focus on the cybersecurity challenges facing small and midsize businesses. Public Statement, US Securities and Exchange Commission (2015)
2. R. von Solms, J. van Niekerk, From information security to cyber security. Comput. Secur. 38, 97–102 (2013).
http://dx.doi.org/10.1016/j.cose.2013.04.004
3. A. Plonk, A. Carblanc, Malicious software (malware): a security threat to the internet economy (2008)
4. T. Ramalingam, B. Christophe, F.W. Samuel, Assessing the potential of IoT in aerospace, in Conference on e-Business, e-Services and e-Society, ed. by A.K. Kar, P.V. Ilavarasan, M.P. Gupta, Y.K. Dwivedi, M. Mäntymäki, M. Janssen, S. Al-Sharhan (Springer, Cham, 2017), pp. 107–121
5. D. Janakiram, V.A. Reddy, A.V.U.P. Kumar, Outlier detection in wireless sensor networks using Bayesian belief networks, in 2006 1st International Conference on Communication Systems Software & Middleware (2006), pp. 1–6.
https://doi.org/10.1109/COMSWA.2006.1665221