1. Cyberspace.
https://en.wikipedia.org/wiki/Cyberspace
. Accessed March 1, 2016.
2. Tzipora, H., Haoyu, L., Di, M., Nitesh, S., Jonathan, V., & Tuo, X. (2014). Context-aware defenses to RFID unauthorized reading and relay attacks. IEEE Transactions on Emerging Topics in Computing,
1(2), 307–318.
3. Jan, Z., Oscar, M., & Klaus, W. (2014). Privacy in the internet of things: Threats and challenges. Security and Communication Networks,
7(12), 2728–2742.
4. Goodman, D. (1997). Why the Police don’t care about computer crime. Law & Techology, 10(3), 465–494.
5. Aditya, S., & Richard, E. (2013). Targeted cyberattacks: A superset of advanced persistent threats. Computer and Reliability Societies,
11(1), 54–61.