Literatur

ADAC (2016). Weiterhin Sicherheitslücke bei Komfortschlüsseln - Fahrzeuge mit Keyless leichter zu klauen. URL http://www.adac.de/keyless.

Auger, M., Sandvik, R., & Pagliery, J. (2015). You can hack this high-tech rifle. URL http://money.cnn.com/2015/07/29/technology/hack-smart-rifle/index.html.

Belikovetsky, S., Yampolskiy, M., Toh, J., & Elovici, Y. (2016). dr0wned - Cyber-Physical Attack with Additive Manufacturing. URL https://arxiv.org/pdf/1609.00133.

Bonaci, T., Herron, J., Yusuf, T., Yan, J., Kohno, T., & Chizeck, H. J. (2015). To Make a Robot Secure: An Experimental Analysis of Cyber Security Threats Against Teleoperated Surgical Robotics. URL http://arxiv.org/pdf/1504.04339v1.pdf.

BSI (2013). Hochverfügbarkeitskompendium Band ...

Get IT-Sicherheit now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.