References
- Brewster, T. (2019, January 15). Exclusive: Hackers take control of giant construction cranes. Forbes, 08:00am. Retrieved from https://www.forbes.com/sites/thomasbrewster/2019/01/15/exclusive-watch-hackers-take-control-of-giant-construction-cranes/#7509c2fe1d0a
- Citron, D. K., & Pasquale, F. (2014). The scored society: Due process for automated predictions. Washington Law Review, 89(1), 1–33.
- Douriez, M., H. Doraiswamy, J. Freire, and C. T. Silva (2016). “Anonymizing NYC Taxi Data: Does It Matter?” IEEE International Conference on Data Science and Advanced Analytics (DSAA), Montreal, QC, 140–148. doi: 10.1109/DSAA.2016.21.
- Dwork, C. (2011). Differential privacy. In: van Tilborg H.C.A., Jajodia S. (eds.). Encyclopedia of Cryptography and Security. MA: Springer, Boston.
- Dwork, C., McSherry, F., Nissim, K., Smith, A. (2006). Calibrating Noise to Sensitivity in Private Data Analysis. In: Halevi S., Rabin T. (eds.). Theory of Cryptography. TCC. Lecture Notes in Computer Science. 3876. Springer, Berlin, Heidelberg. doi: 10.1007/11681878_14
- Dwork, C., & Pappas, G. J. (2017). Privacy in information-rich intelligent infrastructure (arXiv preprint arXiv:1706.01985). Retrieved from https://arxiv.org/ftp/arxiv/papers/1706/1706.01985.pdf
- Evans, B. G., Thompson, P. T., Corazza, G. E., Vanelli-Coralli, A., & Candreva, E. A. (2011). 1945–2010: 65 years of satellite history from early visions to latest missions. Proceedings of the IEEE, 99(11), 1840–1857. doi:10.1109/JPROC.2011.2159467
- Gallager, S. (2016, November 28). Ransomware locks up San Francisco public transportation ticket machines: Some systems now restored; attacker demanded $73,000. ArsTechnica. Retrieved from https://arstechnica.com/information-technology/2016/11/san-francisco-muni-hit-by-black-friday-ransomware-attack/
- Khandelwal, S. (2015). Russian Hackers Hijack satellite to steal data from thousands of hacked computers. The Hacker News. Retrieved from https://thehackernews.com/2015/09/hacking-satellite.html
- Krebs, B. (2018). Mirai Botnet authors avoid Jail Time. Krebs on Security. Retrieved from https://krebsonsecurity.com/tag/mirai-botnet/
- Li, G., Yu, P. S., Zhou, W., & Zhu, T. (2017). Differential privacy and applications (69). Cham, Switzerland: Springer International Publishing.
- Montjoye, Y. A., Hidalgo, C. A., Verleysen, M., & Blondel, V. D. (2013). Unique in the Crowd: The privacy bounds of human mobility. Scientific Reports, 3. Retrieved from https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3607247/
- Pandurangan, V. (2014). On taxis and rainbows: Lessons from NYC’s improperly anonymized taxi logs. Retrieved from https://tech.vijayp.ca/of-taxisand-rainbows-f6bc289679a1
- Pasquale, F. (2015). The black box society: The secret algorithms that control money and information. Cambridge, Massachusetts: Harvard University Press.
- Porup, J. M. (2015). It’s Surprisingly Simple to Hack a Satellite: Hackers Sec and schneider demonstrate how to eavesdrop on Iridium satellite pager traffic using rad1o badges. Motherboard. Retrieved from https://motherboard.vice.com/en_us/article/bmjq5a/its-surprisingly-simple-to-hack-a-satellite
- Roberts, P. (2018). Lethal artificial intelligence and autonomy. RUSI. Retrieved from https://rusi.org/publication/conference-reports/lethal-artificial-intelligence-and-autonomy
- Rogaway, P. 2015. The moral character of cryptographic work. 2015 IACR Distinguished Lecture given at Asiacrypt 2015 on December 2, 2015, in Auckland, New Zealand. Retrieved from https://pdfs.semanticscholar.org/a57e/28eecdbe2b5112c3bb2f97bf347652233b3a.pdf
- Sajid, A., Abbas, H., & Saleem, K. (2016). Cloud-assisted IoT-based SCADA systems security: A review of the state of the art and future challenges. IEEE Access, 4, 1375–1384. doi:10.1109/ACCESS.2016.2549047
- Sharma, S., Chen, K., & Sheth, A. (2018). Toward practical privacy-preserving analytics for iot and cloud-based healthcare systems. IEEE Internet Computing, 22(2), 42–51. doi:10.1109/MIC.2018.112102519