- ATT-NB: AT&T NetBond® User Guide, https://www.synaptic.att.com/assets/us/en/home/NB_User_Guide_AWS_Priv_Pub.pdf
- AMQP-SPEC: http://docs.oasis-open.org/amqp/core/v1.0/os/amqp-core-overview-v1.0-os.html
- AMQP: https://en.wikipedia.org/wiki/Advanced_Message_Queuing_Protocol
- AI-FOR: Artificial Intelligence Will Revolutionize Cybersecurity, a whitepaper from Forrester
- AWS-IOT: https://aws.amazon.com/iot-core/
- AWS-IAM: https://www.slideshare.net/AmazonWebServices/best-practices-with-iot-security-februart-online-tech-talks/4
- BAYNET: Bayshore Networks® Defends against ICS/SCADA Malware, https://www.bayshorenetworks.com/news/2016/08/bayshore-networks-defends-against-icsscada-malware
- BEL-CAS: https://www.belden.com/hubfs/resources/knowledge/case-studies/plc-security-for-water-wastewater-systems.pdf
- BLO-INF: https://blockchain.info
- CYDATA: Not All Machine Learning Is Created Equal: Why Cylance Beats the Competition When It Comes to Endpoint Protection
- CSC-FAC: Advancing automation – Cybersecurity in Industrial Environments Volume VII, http://www.automation.com/
- COI-JOU: https://coinjournal.net/chronicled-completes-pilot-blockchain-enabled-supply-chain-system/
- CSC-FOG: https://www.cisco.com/c/dam/en_us/solutions/trends/iot/docs/computing-overview.pdf
- CSCC: Cloud Customer Architecture for Securing Workloads on Cloud Services, http://www.cloud-council.org/deliverables/CSCC-Cloud-Customer-Architecture-for-Securing-Workloads-on-Cloud-Services.pdf
- CSA-API: Cloud Standards Customer Council 2017, Cloud Customer Architecture for API Management, http://www.cloud-council.org/deliverables/cloud-customer-architecture-for-api-management.htm
- DHS-NCCIC: ICS CYBERSECURITY FOR THE C-LEVEL, https://ics-cert.us-cert.gov/sites/default/files/FactSheets/NCCIC%20ICS_FactSheet_ICS_Cybersecurity_C-Level_S508C.pdf
- DOT-VHC: https://www.transportation.gov/briefing-room/us-dot-issues-federal-guidance-automotive-industry-improving-motor-vehicle
- DIG-HLT: WannaCry impact on NHS considerably larger than previously suggested, https://www.digitalhealth.net/2017/10/wannacry-impact-on-nhs-considerably-larger-than-previously-suggested
- DARKT-THREAT: DARKTRACE Global Threat Report 2017, https://www.darktrace.com/resources/wp-global-threat-report-2017.pdf
- DEF-IPSEC: Introduction to Cisco IPSec Technology, https://www.cisco.com/c/en/us/td/docs/net_mgmt/vpn_solutions_center/2-0/ip_security/provisioning/guide/IPsecPG1.html#wp1030249
- DDS-DEF: https://www.rti.com/products/what-is-a-databus
- DDS SECURE: DDS Security Specification Version 1.1. BETA, https://www.omg.org/spec/DDS-SECURITY/About-DDS-SECURITY/
- draft-KTM: https://tools.ietf.org/html/draft-keoh-tls-multicast-security-00
- ENER-SYMT: http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/targeted_attacks_against_the_energy_sector.pdf
- ETN-WRD: http://www.wired.co.uk/article/what-is-eternal-blue-exploit-vulnerability-patch
- ESec-BP: IIC Endpoint Security Best Practices, IIC:WHT:IN17:V1.6.3:ID:20180129 Steve Hanna, Srinivas Kumar, Dean Weber
- EST-CERT: PKI—Simplify Certificate Provisioning with EST, Whitepaper Cisco, https://www.cisco.com/c/dam/en_us/about/doing_business/trust-center/docs/public-key-infrastructure-provisioning-with-est.pdf
- ETH-BLK: https://www.ethereum.org/
- FSV-IoT: CYBER SECURITY IN THE ERA OF INDUSTRIAL IOT, A Frost & Sullivan White Paper, https://ww2.frost.com/frost-perspectives/cyber-security-era-industrial-iot/
- FDA-MED: FDA approves pill with sensor that digitally tracks if patients have ingested their medication, https://www.fda.gov/NewsEvents/Newsroom/PressAnnouncements/ucm584933.htm
- Fog-ORA: https://www.openfogconsortium.org/wp-content/uploads/OpenFog_Reference_Architecture_2_09_17-FINAL.pdf
- FIPS-180: FIPS PUB 180-4, https://ws680.nist.gov/publication/get_pdf.cfm?pub_id=910977
- GE-IIoT: http://www.geautomation.com/industrial-internet
- GART-IOT: Gartner IoT Glossary, https://www.gartner.com/it-glossary/
- GART-IIoT: Cybersecurity Myths of the Industrial IoT, https://www.gartner.com/smarterwithgartner/cybersecurity-myths-of-the-industrial-iot/
- GART-CL: https://www.gartner.com/newsroom/id/3616417
- HOM-WIK: https://en.wikipedia.org/wiki/Homomorphic_encryption
- IEEE-IOT: https://iot.ieee.org/images/files/pdf/IEEE_IoT_Towards_Definition_Internet_of_Things_Revision1_27MAY15.pdf
- ISP-4IR: https://www.i-scoop.eu/industry-4-0/
- ISP-IIoT: https://www.i-scoop.eu/internet-of-things-guide/industrial-internet-things-iiot-saving-costs-innovation/industrial-internet/
- IOT-WLD: Industry of Things World Survey Report 2017, https://industryofthingsworld.com/
- ICS-WIKI: https://en.wikipedia.org/wiki/Industrial_control_system
- IOT-SEC: Practical Internet of Things Security by Brian Russell, Drew Van Duren, Packt Publishing.
- ITU-IOT: ITU-T Rec. Y.2060 (06/2012) Overview of the Internet of things; https://www.itu.int
- IIC-IISF: INDUSTRIAL INTERNET SECURITY FRAMEWORK TECHNICAL REPORT, https://www.iiconsortium.org/IISF.htm
- IIC-IIRA: INDUSTRIAL INTERNET REFERENCE ARCHITECTURE v 1.8, https://www.iiconsortium.org/IIC_PUB_G1_V1.80_2017-01-31.pdf
- ISA-SECURE: www.isasecure.org
- IBM-MSS: Attacks Targeting Industrial Control Systems (ICS) Up 110 Percent, https://securityintelligence.com/attacks-targeting-industrial-control-systems-ics-up-110-percent/
- IIC-IICF: Industrial Internet of Things Connectivity Framework, www.iiconsortium.org/IICF-faq.htm
- IISF: Industrial Internet Security Framework
- INS: Industrial Network Security Authors: Eric D. Knapp and Joel Langill(https://www.elsevier.com/books-and-journals). Learn more about Industrial Network Security from Syngress (https://www.elsevier.com/books/industrial-network-security/knapp/978-0-12-420114-9).
- INCIBE: Protocol and Network Security in ICS Infrastructures, INCIBE, https://www.incibe.es/extfrontinteco/img/File/intecocert/ManualesGuias/incibe_protocol_net_security_ics.pdf
- IIoT-DATA: http://industrial.embedded-computing.com/articles/five-keys-to-securing-the-iiot-data-pipe/
- ICO-DEF: Embedded Firewall, https://www.automationworld.com/article/technologies/security/embedded-firewall
- IoT Security Maturity Model (IIC-SMM): Description and Intended Use, IIC:PUB:IN15:V1.0:PB:20180409, https://www.iiconsortium.org/pdf/SMM_Description_and_Intended_Use_2018-04-09.pdf
- ISA-95: Enterprise-Control System Integration, https://www.isa.org/isa95/
- IBM-CIOT: http://www.ibmbigdatahub.com/blog/what-cognitive-iot
- IIC-TSN: IIC Webinar—Modernizing your Industrial Networks, Time Sensitive Networks Readiness, http://www.iiconsortium.org/webinars/index.htm
- IE3-TSN: Time-Sensitive Networking Task Group, http://www.ieee802.org/1/pages/tsn.html
- ISAC-SANS: https://ics.sans.org/media/E-ISAC_SANS_Ukraine_DUC_5.pdf
- ICS-WIR: https://www.wired.com/2016/03/inside-cunning-unprecedented-hack-ukraines-power-grid/
- IoT Security Maturity Model (IIC-SMM): Description and Intended Use, IIC:PUB:IN15:V1.0:PB:20180409, https://www.iiconsortium.org/pdf/SMM_Description_and_Intended_Use_2018-04-09.pdf
- INETNW: http://www.internetnews.com/xSP/article.php/3603256/Chambers+The+Network+Is+The+Platform.htm
- JSRS: Identity Fraud Hits Record High with 15.4 Million U.S. Victims in 2016, https://www.javelinstrategy.com/press-release/identity-fraud-hits-record-high-154-million-us-victims-2016-16-percent-according-new
- LoRA-DEF: https://lora-alliance.org/about-lorawan
- MST-TRM: https://msdn.microsoft.com/en-us/library/ff648644.aspx
- MST-STR: Internet of Things Security Architecture—Security in IoT, 2016-June-3, https://azure.microsoft.com/en-us/documentation/articles/iot-hub-securityarchitecture/
- MS-DREAD: https://docs.microsoft.com/en-us/windows-hardware/drivers/driversecurity/threat-modeling-for-drivers
- MS-DXL: https://www.slideshare.net/McAfee/tech-talk-the-data-exchange-layer-dxl
- Massachusetts Institute of Technology-Kerberos (MIT-Kerb): The Network Authentication Protocol. MIT, 2016-Apr-20, retrieved 2016-09-26, http://web.mit.edu/kerberos/
- MOC-TRUST: WHITE PAPER Hardening the IoT Stack, www.mocana.com
- MRA-DOC: Bayshore Whitepaper SECURING OPERATIONAL TECHNOLOGY IN THE PHARMACEUTICAL AND CHEMICAL MANUFACTURING INDUSTRIES.
- MQTTv3.1.1-OASIS: http://docs.oasis-open.org/mqtt/mqtt/v3.1.1/mqtt-v3.1.1.pdf
- MQTT-SN: http://mqtt.org/new/wp-content/uploads/2009/06/MQTT-SN_spec_v1.2.pdf
- MATH-ML: https://www.mathworks.com/discovery/machine-learning.html
- ML-CHA: https://towardsdatascience.com/ai-and-machine-learning-in-cyber-security-d6fbee480af0
- MIT-PUF: https://people.csail.mit.edu/devadas/pubs/rfid_puf_08.pdf
- MIT-PUF: https://people.csail.mit.edu/devadas/pubs/rfid_puf_08.pdf
- MS-DEF: https://smartbear.com/learn/api-design/what-are-microservices/
- NIST-800-82r2: Guide to Industrial Control Systems (ICS) Security, https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-82r2.pdf
- NIST-SMG: Technologies to Enable a Smart Grid, NIST, https://www.nist.gov/sites/default/files/documents/2017/05/09/energy_wp_10_28_10.pdf
- NIST-CPS: Framework for Cyber-Physical Systems , Release 1.0, https://s3.amazonaws.com/nist-sgcps/cpspwg/files/pwgglobal/CPS_PWG_Framework_for_Cyber_Physical_Systems_Release_1_0Final.pdf
- NIST-PE: NIST Special Publication, 800-53, Revision 4, Security and Privacy Controls for Federal Information Systems and Organizations
- NIST-800-53: Security and Privacy Controls for Federal Information Systems and Organizations, https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf
- NULL-CON:NullCon https://nullcon.net/website/
- OWA-IoT: https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project#tab=IoT_Attack_Surface_Areas
- OWA-TRM: https://www.owasp.org/index.php/Threat_Risk_Modeling
- OWA-IOTP: https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project#tab=Main
- OASIS-OPEN: http://docs.oasis-open.org/mqtt/mqtt/v3.1.1/os/mqtt-v3.1.1-os.html
- OAUTH-SEC: http://www.oauthsecurity.com
- OAUTH-SANS: https://www.sans.org/reading-room/whitepapers/application/%20attacks-oauth-secure-oauth-implementation-33644
- OMG-DDS: http://portals.omg.org/dds/
- ONE-M2M: http://www.onem2m.org/
- OPC-WP: https://opcfoundation.org/wp-content/uploads/2016/04/OPC-UA-Security-Advise-EN.png
- OPCF: OPC Foundation, https://opcfoundation.org/
- openFMB: http://www.greenenergycorp.com/2016/03/17/naesb-ratifies-openfmb/
- OWASP-SEC: The Open Web Application Security Project ("OWASP"). OWASP Secure Coding Practices, https://www.owasp.org/images/0/08/OWASP_SCP_Quick_Reference_Guide_v2.pdf
- PRA: Purdue Enterprise Reference Architecture, https://en.wikipedia.org/wiki/Purdue_Enterprise_Reference_Architecture
- PDX-BRF: https://www.predix.com/sites/default/files/predix-the-industrial-internet-platform-from-ge-digital-brief.pdf
- PDX-IO: https://docs.predix.io/en-US/content/platform/get_started/predix_overview/
- PDX-ARC: Predix Architecture and Services, Technical Whitepaper, https://www.predix.com/sites/default/files/ge-predix-architecture-r092615.pdf
- RIE-GERT: Rieger, C.G.; Gertman, D.I.; McQueen, M.A. (May 2009), Resilient Control Systems: Next Generation Design Research, Catania, Italy: 2nd IEEE Conference on Human System Interaction.
- RFC-6749: The OAuth 2.0 Authorization Framework, https://tools.ietf.org/html/rfc6749
- RFC-7252: The Constrained Application Protocol (CoAP), https://tools.ietf.org/html/rfc7252
- RFC-6347: Datagram Transport Layer Security Version 1.2, https://tools.ietf.org/html/rfc6347
- RFC-6819: OAuth 2.0 Threat Model and Security Considerations, https://tools.ietf.org/html/rfc6819https://tools.ietf.org/html/rfc6819
- RFC 4122: A Universally Unique Identifier (UUID) URN Namespace,https://tools.ietf.org/html/rfc4122
- RFC2: RFC 5280, https://tools.ietf.org/html/rfc5280
- RFC 7030: https://tools.ietf.org/html/rfc7030
- RFC-6090: https://tools.ietf.org/html/rfc6090
- RFC-TLS: RFC 4346, https://www.ietf.org/rfc/rfc4346.txt
- RFC-UDP: https://tools.ietf.org/html/rfc768
- RFC 6347: https://tools.ietf.org/html/rfc6347
- RFC 7252: https://www.rfc-editor.org/rfc/rfc7252.txt
- RFC 4301: https://tools.ietf.org/html/rfc4301
- STN-REP: Stuxnet Worm Attack on Iranian Nuclear Facilities, Michael Holloway, July 16, 2015, http://large.stanford.edu/courses/2015/ph241/holloway1/
- SANS-1: Identification with Zero Knowledge Protocols, Annarita Giani, https://www.sans.org/reading-room/whitepapers/vpns/identification-zero-knowledge-protocols-719
- SASL-OATH: The OAuth 2.0 Internet of Things (IoT) Client Credentials Grant, https://tools.ietf.org/id/draft-tschofenig-ace-oauth-iot-01.html#I-D.ietf-kitten-sasl-oauth
- SEC-IIoT: Jacob Wurm, Khoa Hoang, Orlando Arias, Ahmad-Reza Sadeghi and Yier Jin. Department of Electrical and Computer Engineering, University of Central Florida and Technische Universität Darmstadt, Germany
- SYM-ECC: Symantec Corporation—Elliptic Curve Cryptography (ECC), Certificates Performance Analysis, whitepaper, https://www.websecurity.symantec.com/content/dam/websitesecurity/digitalassets/desktop/pdfs/whitepaper/Elliptic_Curve_Cryptography_ECC_WP_en_us.pdf
- SIF-ODF: Firewall: On-demand Virtual Firewall and IPS Services, http://www.cloudinfinit.com/products/IaaS/cloud/security/firwl
- SOV-IDN: https://sovrin.org/wp-content/uploads/Sovrin-Protocol-and-Token-White-Paper.pdf
- SEI-SEC: Software Engineering Institute, Carnegie Mellon University. SEI CERT Top 10 Secure Coding Practices, https://www.securecoding.cert.org/confluence/display/seccode/Top+10+Secure+Coding+Practices
- Tschofenig-ace: Authentication and Authorization for Constrained Environments (ACE), https://tools.ietf.org/html/draft-ietf-ace-oauth-authz-09
- TCGG-29: TCG Guidance for Securing Network Equipment Using TCG Technology, Version 1.0 Revision 29 Jan 17, 2018 Published
- TIA: ANSI TIA-942-A, http://www.tia-942.org/
- TSN-CS: Time-Sensitive Networking (TSN) in the Electric Sector—Security, a paper by Dr. Armando Astarloa and Mikel Rodriguez, https://soc-e.com
- TSN-BEL: https://www.belden.com/blog/industrial-ethernet/what-is-tsn-a-look-at-its-role-in-future-ethernet-networks
- TSN-AUT1: https://www.automationworld.com/article/industry-type/all/4-reasons-why-time-sensitive-networking-matters
- TSN-CSC: https://www.cisco.com/c/dam/en/us/solutions/collateral/industry-solutions/white-paper-c11-738950.pdf
- TSN-AUT2: https://www.automationworld.com/video/how-time-sensitive-networks-are-transforming-industrial-networks-today
- USG-WS: THE STORY OF WATERFALL SECURITY & UNIDIRECTIONAL GATEWAY TECHNOLOGY, https://static.waterfall-security.com/Company-Profile_Waterfall-Security.pdf
- USE-C2M2: Office of Electricity Delivery and Energy Reliability—Cybersecurity Capability Maturity Model (C2M2), http://energy.gov/sites/prod/files/2014/03/f13/C2M2-v1-1_cor.pdf
- USE-C2M2: Office of Electricity Delivery and Energy Reliability–Cybersecurity Capability Maturity Model (C2M2), http://energy.gov/sites/prod/files/2014/03/f13/C2M2-v1-1_cor.pdf
- VPN-DEF: Wikipedia, https://en.wikipedia.org/wiki/Virtual_private_network
- WLT-ICS: An Executive Guide to Cyber Security for Operational Technology, https://www.ge.com/digital/cyber-security
- WAVE-1609: IEEE 1609.2™-2016, Standard for Wireless Access in Vehicular Environments—Security Services for Applications and Management Messages. T. M. Kurihara, Chair, IEEE 1609 Working Group, W. Whyte, Vice-Chair, IEEE 1609 Working Group ITU-T CITS Tokyo, Japan July 5, 2016
- WSN: Wireless Sensor Network Security, https://www.sciencedirect.com/science/ article/pii/S2452414X16301029
- W3C: http://www.w3.org/TR/2004/NOTE-ws-gloss-20040211/#webservice
- WSS-SEC: https://en.wikipedia.org/wiki/WS-Security
- WATERSEC: https://waterfall-security.com/
- WAT-CAS: https://www.theregister.co.uk/2016/03/24/water_utility_hacked/