2 Bibliography Peter Germain ENC: 1102 College Composition 2 Professor Fiedler 12

2

Bibliography

Peter Germain

ENC: 1102 College Composition 2

Professor Fiedler

12 May 2022

Bibliography

Merriam-Webster’s Collegiate Dictionary (11th ed.) (2005) Merriam-wester Incorporated

Umbach, F. (2012). CRITICAL ENERGY INFRASTRUCTURE AT RISK OF CYBER ATTACK. Konrad Adenauer Stiftung. http://www.jstor.org/stable/resrep09954

Ross, Yan, (2021), Cyber Defense Magazine, Retrieved from Cyber-Defense-Magazine-RSA-Edition-for-2021.pdf (cyberdefensemagazine.com)

Sahoo, Subham & Mishra, Sukumar & Peng, Jimmy & Dragicevic, Tomislav. (2018). A Stealth Cyber Attack Detection Strategy for DC Microgrids. IEEE Transactions on Power Electronics. PP. 1-1. 10.1109/TPEL.2018.2879886.

IEEE Computer Society. (2018). What is the Cyber Kill Chain and How It Can Protect Against Attacks?

Retrieved from https://www.computer.org/publications/tech-news/trends/what-is-the-cyber-kill-chain-and-how-it-can-protect-against-attacks

Southern New Hampshire University. (2021). What is Cyber Security and Why is it Important?

Available from https://www.infoplease.com/encyclopedia/social-science/government/us/national-security-agency [accessed 13 May 2022].

Julian Jang-Jaccard, Surya Nepal, A survey of emerging threats in cybersecurity, Journal of

Computer and System Sciences,Volume 80, Issue 5, 2014, Pages 973-993, ISSN

00220000, https://doi.org/10.1016/j.jcss.2014.02.005.

https://www.sciencedirect.com/science/article/pii/S0022000014000178