2
Bibliography
Peter Germain
ENC: 1102 College Composition 2
Professor Fiedler
12 May 2022
Bibliography
Merriam-Webster’s Collegiate Dictionary (11th ed.) (2005) Merriam-wester Incorporated
Umbach, F. (2012). CRITICAL ENERGY INFRASTRUCTURE AT RISK OF CYBER ATTACK. Konrad Adenauer Stiftung. http://www.jstor.org/stable/resrep09954
Ross, Yan, (2021), Cyber Defense Magazine, Retrieved from Cyber-Defense-Magazine-RSA-Edition-for-2021.pdf (cyberdefensemagazine.com)
Sahoo, Subham & Mishra, Sukumar & Peng, Jimmy & Dragicevic, Tomislav. (2018). A Stealth Cyber Attack Detection Strategy for DC Microgrids. IEEE Transactions on Power Electronics. PP. 1-1. 10.1109/TPEL.2018.2879886.
IEEE Computer Society. (2018). What is the Cyber Kill Chain and How It Can Protect Against Attacks?
Retrieved from https://www.computer.org/publications/tech-news/trends/what-is-the-cyber-kill-chain-and-how-it-can-protect-against-attacks
Southern New Hampshire University. (2021). What is Cyber Security and Why is it Important?
Available from https://www.infoplease.com/encyclopedia/social-science/government/us/national-security-agency [accessed 13 May 2022].
Julian Jang-Jaccard, Surya Nepal, A survey of emerging threats in cybersecurity, Journal of
Computer and System Sciences,Volume 80, Issue 5, 2014, Pages 973-993, ISSN
00220000, https://doi.org/10.1016/j.jcss.2014.02.005.
https://www.sciencedirect.com/science/article/pii/S0022000014000178