Publisher
Springer Nature Singapore
Reference15 articles.
1. Resul, D. A. S., & Gündüz, M. Z. (2019). Analysis of cyber-attacks in IoT-based critical infrastructures. International Journal of Information Security science, 8(4), 122–133.
2. Humayed, A., Lin, J., Li, F., & Luo, B. (2017). Cyber-physical systems security-a survey. IEEE Internet of Things Journal, 4, 1802–1831.
3. Sasaki, M., et al. (2011). Field test of quantum key distribution in the Tokyo QKD Network. Optics Express, 19(11), 10387–10409.
4. Yao, Q., Wang, Q., Zhang, X., & Fei, J. (2021). Dynamic access control and authorization system based on zero-trust architecture. In: Proceedings of the 2020 1st international conference on control, robotics, and intelligent systems. CCRIS ’20 (pp. 123–127). New York, NY, USA: Association for Computing Machinery. https://doi.org/10.1145/3437802.3437824. ISBN 978–1–4503–8805–4. S2CID 230507437.
5. Higgins, K. J. (2021). Forrester pushes ‘zero trust’ model for security. Dark Reading. Informa.