Bibliografía

  1. Cybersecurity Myths on Power Control Systems: 21 Misconceptions and False Beliefs. Pietre-Cambacedes, Trischler, Ericsson. IEEE Transactions on Power Delivery, Vol 26, No. 1, January 2011.
  2. stuxnet dossier. N. Falliere, LO Murchu, E Chien. Symantec Whitepaper 2011.
  3. Stuxnet: Dissecting a Cyberwarfare Weapon. R. Langner. IEEE Security & Privacy. 2011.
  4. Analysis of the Cyber Attack on the Ukrainian Power Grid. SANS, 2016.
  5. Limiting the Impact of Stealthy Attacks on Industrial Control Systems. Urbina, Giraldo, A. Cardenas, Tippenhauer, Valente, Faisal, Ruths, Candell, Sandberg. ACM CCS, 2016.
  6. Privacy-Aware Design Principles for Information Networks. Wicker and Schrader. Proceedings of the IEEE.
  7. Kolias, C., Copi, L., Zhang, F., & Stavrou, A. (2017, April). Breaking BLE Beacons For Fun But Mostly Profit. In Proceedings of the 10th European Workshop on Systems Security (p. 4). ACM.
  8. Fawaz, Kassem, Kyu-Han Kim, and Kang G. Shin. “Protecting Privacy of BLE Device Users.” 25th USENIX Security Symposium (USENIX Security 16). USENIX Association, 2016.
  9. Getting Started with Bluetooth Low Energy. K. Townsend, C. Cufi, A & R Davidson. O’Reilly, 2015.