Adam, N. (2010). Workshop on future directions in cyber-physical systems security. Department of Homeland Security.
Google Scholar
Australian Communications and Media Authority. (n.d.). CyberSmart. Retrieved April 17, 2015 from http://www.cybersmart.gov.au/.
Australian Competition and Consumer Commission. (n.d.). SCAMWatch. Retrieved April 17, 2015 from http://www.scamwatch.gov.au.
Australian Cyber Security Centre. (n.d.). Australian cyber security centre. Retrieved January 26, 2015 from http://www.acsc.gov.au/.
Australian Federal Police. (n.d.). High tech crime. Retrieved January 26, 2015 from http://www.afp.gov.au/en/policing/cybercrime/hightech-crime.aspx.
Australian Government. (n.d.). Security. Retrieved April 18, 2015 from http://www.my.gov.au/mygov/content/html/security.html.
Australian Government Department of Communications. (n.d.). Stay smart online. Retrieved April 17, 2015 from http://www.staysmartonline.gov.au.
Australian Government. (2013). Attorney-General’s Department. National plan to combat cybercrime: Achieving a just and secure society.
Google Scholar
Australian Government: Attorney-General’s Department. (n.d.). Computer emergency response team. Retrieved January 26, 2015 from http://www.cert.gov.au/.
Australian Government: Department of the Prime Minister and Cabinet. (n.d.). Australian government’s cyber security review. Retrieved April 18, 2015 from http://www.dpmc.gov.au/pmc/about-pmc/core-priorities/national-security-and-international-policy/australian-governments-cyber-security-review.
Australian National University. (n.d.). Login & Passwords. Retrieved April 18, 2015 from http://itservices.anu.edu.au/login-and-passwords/.
Cardenas, A. A., Amin, S., Sinopoli, B., Giani, A., Perrig, A., & Sastry, S. (2009). Challenges for securing cyber physical systems. Paper presented at the Workshop on Future Directions in Cyber-physical Systems Security.
Google Scholar
CERT Australia. (2013). Cyber crime & security survey report.
Google Scholar
Chen-Khong, T., & Tie, L. (2013). Sensing-driven energy purchasing in smart grid cyber-physical system. Systems, man, and cybernetics: Systems, IEEE transactions on, 43(4), 773–784. doi:10.1109/TSMCA.2012.2224337.
Google Scholar
Commonwealth Bank of Australia. (n.d.). Online security. Retrieved April 18, 2015 from http://www.commbank.com.au/personal/netbank/online-security.html?ei=gsa_generic_online-security.
Energetics Incorporated. (2012). Cyber-physical systems: Situation analysis of current trends, technologies, and challenges. Retrieved from http://events.energetics.com/NIST-CPSWorkshop/pdfs/CPS_Situation_Analysis.pdf.
Feder, B. J. (2008). A heart device is found vulnerable to hacker attacks, The New York Times. Retrieved from http://www.nytimes.com/2008/03/12/business/12heart-web.html?_r=2 &.
Fei Yue Community Services. (n.d.). Fei Yue Community Services. Retrieved March 28, 2015 from http://www.fycs.org/.
Hoe, P. S., & Hussain, A. (2015). S’pore 7th highest in Asia-Pac for social media scams, The Straits Times, p. 5.
Google Scholar
Infocomm Development Authority of Singapore. (n.d.-a). Household access to internet 2003–2013. Retrieved January 14, 2015 from http://www.ida.gov.sg/Infocomm-Landscape/Facts-and-Figures/Infocomm-Usage-Households-and-Individuals - 4.
Infocomm Development Authority of Singapore. (n.d.-b). The National Cyber Security Masterplan 2018. Retrieved December 27, 2014 from www.ida.gov.sg/Programmes-Partnership/Store/National-Cyber-Security-Masterplan-2018.
Infocomm Development Authority of Singapore. (n.d.-c). Telecommunications: Facts & figures. Retrieved December 27, 2014 from http://www.ida.gov.sg/Infocomm-Landscape/Facts-and-Figures/Telecommunications–1.
Internet Education and Safety Services. (n.d.). Internet education and safety services. Retrieved April 20, 2015 from http://www.iness.com.au/.
Jiow, H. J. (2013). Cyber crime in Singapore: An analysis of regulation based on Lessig’s four modalities of constraint. International Journal of Cyber Criminology, 7(1), 18–27.
Google Scholar
Karake-Shalhoub, Z., & Al Qasimi, L. (2010). Cyber law and cyber security in developing and emerging economies. Cheltenham: Edward Elgar Publishing.
CrossRef
Google Scholar
Kingmaker Consultancy. (n.d.). Kingmaker Consultancy. Retrieved March 28, 2015 from http://kingmaker.com.sg/.
Koscher, K., Czeskis, A., Roesner, F., Patel, S., Kohno, T., Checkoway, S.et al. (2010, May). Experimental security analysis of a modern automobile. Paper presented at the IEEE Symposium on Security and Privacy Berkeley, CA.
Google Scholar
Kostadinov, D. (n.d.). H@acking implantable medical devices. Retrieved March 28, 2015 from http://resources.infosecinstitute.com/hcking-implantable-medical-devices/.
Lau, J. K.-S., Tham, C.-K., & Luo, T. (2011). Participatory cyber physical system in public transport application. Paper presented at the Fourth IEEE International Conference on Utility and Cloud Computing, Melbourne. http://www1.i2r.a-star.edu.sg/~luot/pub/%5BUCC11%5D-Participatory-Sensing-CPS-Transport.pdf.
Leavitt, N. (2010). Researchers fight to keep implanted medical devices safe from hackers. Computer, 43(8), 11–14. doi:10.1109/MC.2010.237.
CrossRef
Google Scholar
Lee, E. A. (2007). Computing foundations and practice for cyber-physical systems: A preliminary report. Berkeley, CA: University of California.
Google Scholar
Lim, A. (2015, March 23). S’pore No. 7 on global list of tech-friendly cities, The Straits Times. Retrieved from http://www.straitstimes.com/archive/monday/premium/money/story/spore-no-7-global-list-tech-friendly-cities-20150323–sthash.JSGKBFSh.dpuf.
Marsh. (2014). Cybercrime in Asia: A changing regulatory environment.
Google Scholar
Media Development Authority of Singapore. (n.d.). Inter-Ministry Cyberwellness Steering Committee. Retrieved March 27, 2015 from http://www.mda.gov.sg/PublicEducation/MediaLiteracy/Pages/MediaLiteracy.aspx.
Mills, E. (2009, May 7). Hackers broke into FAA air traffic control systems, CNET. Retrieved from http://www.cnet.com/news/report-hackers-broke-into-faa-air-traffic-control-systems/.
Monetary Authority of Singapore. (n.d.). Understanding two-factor authentication and transaction signing. Retrieved April 13, 2015 from http://www.mas.gov.sg/moneysense/understanding-financial-products/investments/consumer-alerts/understanding-two-factor-authentication-and-transaction-signing.aspx.
Murdoch University. (n.d.). Murdoch password help. Retrieved April 18, 2015 from http://our.murdoch.edu.au/IT/Access-and-passwords/Login-at-Murdoch/Murdoch-Password/Murdoch-Password-help/—changepasswd.
Nanyang Technological University. (n.d.). New student. Retrieved April 18, 2015 from http://www.ntu.edu.sg/cits/newusers/newstudent/Pages/password.aspx.
National Australia Bank. (n.d.). Online security. Retrieved April 13, 2015 from http://www.nab.com.au/personal/internet-banking/security.
National University of Singapore. (n.d.). Update to NUSNET password policy. Retrieved April 13, 2015 from http://www.nus.edu.sg/comcen/gethelp/guide/itcare/Update to NUSNET Password Policy.pdf.
Parliament of Australia. (n.d.). Cyber security. Retrieved February 6, 2015 from http://www.aph.gov.au/About_Parliament/Parliamentary_Departments/Parliamentary_Library/pubs/BriefingBook44p/Cyber.
Pasqualetti, F., Dorfler, F., & Bullo, F. (2013). Attack detection and identification in cyber-physical systems. Automatic Control, IEEE Transactions on, 58(11), 2715–2729. doi:10.1109/TAC.2013.2266831.
CrossRef
Google Scholar
Prime Minister of Australia: The Hon Tony Abbott MP. (2014). Cyber security review. Retrieved April 21, 2015 from http://www.pm.gov.au/media/2014–11-27/cyber-security-review-0.
Raising Children Network. (n.d.). Raising Children Network. Retrieved April 17, 2015 from http://raisingchildren.net.au/.
Rajkumar, R., Insup, L., Lui, S., & Stankovic, J. (2010). Cyber-physical systems: The next computing revolution. Paper presented at the Design Automation Conference, Anaheim, CA.
Google Scholar
Richards, K. (2009). The Australian business assessment of computer user security: A national survey. In K. Richards (Ed.). Research and Public Policy Series (Vol. 102). Australian Institute of Criminology.
Google Scholar
Singapore Government. (n.d.). Singpass. Retrieved April 13, 2015 from http://www.singpass.gov.sg/sppubsvc/.
Singapore Police Force. (n.d.). Annual crime brief 2014. Retrieved February 3, 2015 from http://www.spf.gov.sg/stats/crimebrief2015.html.
Singapore Power. (2015). About SP PowerGrid. Retrieved February 14, 2015 from http://www.singaporepower.com.sg/irj/portal?NavigationTarget=navurl://7d33724dfa9cf671e4314064deccb86e&windowId=WID1423881503391.
SingCERT. (n.d.). FAQ. Retrieved April 13, 2015 from http://www.singcert.org.sg/faq-topmenu-26 - A1.
Symantec Corporation. (2013a). Norton report 2013, Australia. Retrieved December 27, 2014 from http://www.symantec.com/content/en/us/about/presskits/b-norton-report-2013-australia.pdf.
Symantec Corporation. (2013b). Norton report 2013, Singapore. Retrieved December 27, 2014 from http://www.symantec.com/content/en/us/about/presskits/b-norton-report-2013-singapore.pdf.
Symantec Corporation. (2014). Internet security threat report 2014 (Vol. 19).
Google Scholar
The University of Melbourne. (n.d.). Infrastructure services—IT. Retrieved April 18, 2015 from https://its.unimelb.edu.au/.
The University of Queensland. (n.d.). UQ password guide. Retrieved April 18, 2015 from http://www.its.uq.edu.au/helpdesk/uq-password-guide.
ThinkUKnow Australia. (n.d.). ThinkUKnow. Retrieved April 17, 2015 from http://www.thinkuknow.org.au/.
TOUCH Cyber Wellness. (n.d.). TOUCH Cyber Wellness. Retrieved March 28, 2015 from http://www.touch.org.sg/touch_cyber_wellness.
Trend Micro. (2013). Blurring boundaries: Trend Micro security predictions for 2014 and beyond. Retrieved April 1, 2015 from http://about-threats.trendmicro.com/au/security-predictions/2014/blurring-boundaries/.
US Department of Homeland Security. (2012). ICS-CERT Incident Response Summary Report, 2009–2011: Industrial Control Systems Cyber Emergency Response Team (ICS-CERT).
Google Scholar
Wang, E. K., Ye, Y., Xiaofei, X., Yiu, S. M., Hui, L. C. K.,et al. (2010, December). Security issues and challenges for cyber physical system. Paper presented at the International Conference on Cyber, Physical and Social Computing.
Google Scholar
Westpac Banking Corporation. (n.d.). How we protect you. Retrieved April 18, 2015 from http://www.westpac.com.au/personal-banking/online-banking/security/how-we-protect-you/.
World Economic Forum. (2015). The Global Information Technology Report 2015: ICTs for Inclusive Growth.
Google Scholar