1. Cyber Attacks on Precision Time Protocol Networks—A Case Study
2. Precision time protocol attack strategies and their resistance to existing security extensions
3. AWS Robotics. https://aws.amazon.com/robomaker/. Accessed: 2022-05--1. AWS Robotics. https://aws.amazon.com/robomaker/. Accessed: 2022-05--1.
4. Manos Antonakakis Tim April Michael Bailey etal 2017. Understanding the mirai botnet. In 26th $$USENIX$$ security symposium ($$USENIX$$ Security 17). 1093--1110. Manos Antonakakis Tim April Michael Bailey et al. 2017. Understanding the mirai botnet. In 26th $$USENIX$$ security symposium ($$USENIX$$ Security 17). 1093--1110.
5. Peva Blanchard , El Mahdi El Mhamdi , Rachid Guerraoui, and Julien Stainer. 2017 . Machine Learning with Adversaries : Byzantine Tolerant Gradient Descent. In Advances in Neural Information Processing Systems, , I. Guyon, U. V. Luxburg, S. Bengio, H. Wallach, R. Fergus, S. Vishwanathan, and R. Garnett (Eds.), Vol. 30 . Curran Associates, Inc . https://proceedings.neurips.cc/paper/2017/file/f4b9ec30ad9f68f89b29639786cb62ef-Paper.pdf Peva Blanchard, El Mahdi El Mhamdi, Rachid Guerraoui, and Julien Stainer. 2017. Machine Learning with Adversaries: Byzantine Tolerant Gradient Descent. In Advances in Neural Information Processing Systems, , I. Guyon, U. V. Luxburg, S. Bengio, H. Wallach, R. Fergus, S. Vishwanathan, and R. Garnett (Eds.), Vol. 30. Curran Associates, Inc. https://proceedings.neurips.cc/paper/2017/file/f4b9ec30ad9f68f89b29639786cb62ef-Paper.pdf