1. Ibm study: hidden costs of data breaches increase expenses for businesses;IBM Security,2018
2. Remote exploitation of an unaltered passenger vehicle;Valasek,2015
3. Wannacry, cybersecurity and health information technology: a time to act;Ehrenfeld;J. Med. Syst.,2017
4. W32. stuxnet dossier;Falliere,2011
5. Ameliorating sources of human error in cybersecurity: technological and human-centered approaches;Coffey,2017