[1] Hernes M, Rot A, Jelonek D, editors. Towards Industry 4.0: Current Challenges in Information Systems. Cham, Switzerland: Springer; 2020 Mar 10.
[2] Wolf W, White GB, Fisch EA, Crago SP, Pooch UW, McMahon JO, Yeung D, Nguyen H, Arakawa M, MacDonald T, Akgul BE. Computer system and network security. CRC press; 2017 Dec 14.
[3] Usmonov M. BASIC CONCEPTS OF INFORMATION SECURITY IN INFORMATION SYSTEMS. WIDE THREATS AND THEIR CONSEQUENCES. Scienceweb academic papers collection. 2021 Jan 1.
[4] Carroll JM. Computer security. Butterworth-Heinemann; 2014 May 20.
[5] Jouini M, Rabai LB, Aissa AB. Classification of security threats in information systems. Procedia Computer Science. 2014 Jan 1;32:489-96.
[6] Stallings W. Computer security principles and practice. 2015.
[7] Ruiz Ben E, Scholl M. The Concept of Usable Privacy and Information Security. InUsable Privacy and Security in Online Public Services 2023 Nov 4 (pp. 1-12). Cham: Springer Nature Switzerland.
[8] Awan JH, Memon S, Khan RA, Noonari AQ, Hussain Z, Usman M. Security strategies to overcome cyber measures, factors and barriers. Eng. Sci. Technol. Int. Res. J. 2017;1(1):51-8.
[9] Elmaghraby AS, Losavio MM. Cyber security challenges in Smart Cities: Safety, security and privacy. Journal of advanced research. 2014 Jul 1;5(4):491-7.
[10] Serpanos DN, Voyiatzis AG. Security challenges in embedded systems. ACM Transactions on embedded computing systems (TECS). 2013 Mar 29;12(1s):1-0.
[11] Levitin G, Hausken K, Taboada HA, Coit DW. Data survivability vs. security in information systems. Reliability Engineering & System Safety. 2012 Apr 1;100:19-27.
[12] Buccafurri F, Holzinger A, Kieseberg P, Tjoa M, Weippl E. Availability, Reliability, and Security in Information Systems. Springer International Publishing; 2016.
[13] Teufel S, Min T, You I, Weippl E. Availability, reliability, and security in information systems. Springer; 2014.
[14] Jürjens J, Rosado DG, Sánchez LE, Fernández-Medina E. Security in information systems: New challenges and opportunities.
[15] Chen F. An investigation and evaluation of risk assessment methods in Information systems.
[16] Rosado DG, Sánchez LE, Fernández-Medina E, Jürjens J. Security in Information Systems: New Challenges and Opportunities J. UCS Special Issue. Journal of Universal Computer Science. 2012 Jan 1;18(6):728-31.
[17] Hnatiienko H, Babenko T, Kovalova Y, Myrutenko L. Method of Early Detection of Information Security Anomalies and Incidents in Information Systems.
[18] Arogundade OT, Abayomi-Alli A, Misra S. An ontology-based security risk management model for information systems. Arabian Journal for Science and Engineering. 2020 Aug;45:6183-98.
[19] Gunduz MZ, Das R. Cyber-security on smart grid: Threats and potential solutions. Computer networks. 2020 Mar 14;169:107094.
[20] Berdik D, Otoum S, Schmidt N, Porter D, Jararweh Y. A survey on blockchain for information systems management and security. Information Processing & Management. 2021 Jan 1;58(1):102397.
[21] Vangala A, Das AK, Chamola V, Korotaev V, Rodrigues JJ. Security in IoT-enabled smart agriculture: Architecture, security solutions and challenges. Cluster Computing. 2023 Apr;26(2):879-902.
[22] Liang X, Kim Y. A survey on security attacks and solutions in the IoT network. In2021 IEEE 11th annual computing and communication workshop and conference (CCWC) 2021 Jan 27 (pp. 0853-0859). IEEE.
[23] Breda G, Kiss M. Overview of information security standards in the field of special protected industry 4.0 areas & industrial security. Procedia Manufacturing. 2020 Jan 1;46:580-90.