1. Al-Ahmad, W., & Mohammad, B. (2012). Can a single security framework address information security risks adequately? International Journal of Digital Information and Wireless Communications, 2, 222–230.
2. Ali, S., Anwar, R. W., & Hussain, O. K. (2015). Cyber security for cyber physical systems: A trust-based approach. Journal of Theoretical and Applied Information Technology, 71, 144–145.
3. Atzori, L., Iera, A., & Morabito, G. (2010). The internet of things: A survey. Computer Networks, 54, 2787–2805.
4. Australia, S. (2015). What is a standard? [Online]. Standards Australia. Available:
http://www.standards.org.au/StandardsDevelopment/What_is_a_Standard/Pages/default.aspx
. Accessed September 28, 2015.
5. AXELOS. (2016). What is ITIL
®
best practice? [Online]. Axelos. Available:
https://www.axelos.com/best-practice-solutions/itil/what-is-itil
. Accessed January 25, 2016.