Author:
McKay Dave,Mashatan Atefeh
Publisher
Springer Nature Singapore
Reference85 articles.
1. Guttman B, Roback EA (1995) An introduction to computer security: the NIST handbook. Diane Publishing. https://doi.org/10.6028/NIST.SP.800-12r1
2. Stallings W (2018) Effective cybersecurity: a guide to using best practices and standards. Addison-Wesley Professional. https://www.pearson.com/us/higher-education/program/Stallings-Effective-Cybersecurity-A-Guide-to-Using-Best-Practices-and-Standards/PGM1835803.html
3. Mosteiro-Sanchez A, Barcelo M, Astorga J, Urbieta A (2020) Securing IIoT using defence-in-depth: towards an end-to-end secure industry 4.0. J Manuf Syst 57:367–378. https://doi.org/10.1016/j.jmsy.2020.10.011
4. Lesavre L, Varin P, Mell P, Davidson M, Shook J (2019) A taxonomic approach to understanding emerging blockchain identity management systems. National Institute of Standards and Technology. White Paper. https://doi.org/10.6028/NIST.CWSP.01142020
5. Green JS, Daniels S (2019) Digital governance: leading and thriving in a world of fast-changing technologies. Routledge, London, UK. https://doi.org/10.4324/9780429022371