Author:
Yadav Rakhi,Kumar Yogendra
Reference30 articles.
1. Stellios I, Kotzanikolaou P, Psarakis M, Alcaraz C, Lopez J (2018) A survey of iot-enabled cyberattacks: assessing attack paths to critical infrastructures and services. IEEE Comms Surv Tutorials
2. Yi P, Zhu T, Zhang Q, Wu Y, Pan L (2016) Puppet attack: a denial of service attack in advanced metering infrastructure network. J Netw Comput Appl 59:325–332
3. Morgner P, Mattejat S, Benenson Z, Muller C, Armknecht F (2017) Insecure to the touch: attacking zigbee 3.0 via touchlink commissioning. In: Proceedings of the ACM conference on security and privacy in wireless and mobile networks, pp 230–240
4. Yao J, Venkitasubramaniam P, Kishore S, Snyder LV, Blum RS, Network topology risk assessment of stealthy cyber-attacks on advanced metering infrastructure networks. In: Conference on information sciences and systems (CISS), pp 1–6
5. Tweneboah-Koduah S, Tsetse AK, Azasoo J, EndicottPopovsky B (2018) Evaluation of cybersecurity threats on smart metering system. In: Information technology—new generations. Springer International Publishing, pp 199–207