P. Neirotti, A. De Marco, A. C. Cagliano, G. Mangano, and F. Scorrano, "Current trends in smart city initiatives: Some stylised facts," Cities, vol. 38, pp. 25-36, 2014.
M. Naphade, G. Banavar, C. Harrison, J. Paraszczak, and R. Morris, "Smarter cities and their innovation challenges," Computer, vol. 44, no. 6, pp. 32-39, 2011.
S. R. Chhetri, N. Rashid, S. Faezi, and M. A. Al Faruque, "Security trends and advances in manufacturing systems in the era of industry 4.0," in IEEE/ACM international conference on computer aided design Google Scholar, 2017.
J. T. van Velzen, "Securing the insecurable?" Datenschutz und Datensicherheit-DuD, vol. 41, no. 10, pp. 613-616, 2017.
A. W. Ahmed, M. M. Ahmed, O. A. Khan, and M. A. Shah, "A comprehensive analysis on the security threats and their countermeasures of iot," INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, vol. 8, no. 7, pp. 489-501, 2017.
S. N. Firdous, Z. Baig, C. Valli, and A. Ibrahim, "Modelling and evaluation of malicious attacks against the iot mqtt protocol," in Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), 2017 IEEE International Conference on. IEEE, 2017, pp. 748-755.
O. Foundation, "Opc data access," 2002.
I. E. Commission, "Iec 62541-1-opc unified architecture-part 1: Overview and concepts," Tech. Rep., 2016.
F. O. for Information Security (BSI), "Opc ua security analysis," Tech. Rep., March 2017.
M. Puys, M.-L. Potet, and P. Lafourcade, "Formal analysis of security properties on the opc-ua scada protocol," in International Conference on Computer Safety, Reliability, and Security. Springer, 2016, pp. 67-75.
A. Fernbach and W. Kastner, "Certificate management in opc ua applications: An evaluation of different trust models," in Emerging Technologies &Factory Automation (ETFA), 2012 IEEE 17th Conference on. IEEE, 2012, pp. 1-6.
S. Cavalieri, G. Cutuli, and S. Monteleone, "Evaluating impact of security on opc ua performance," in Human System Interactions (HSI), 2010 3rd Conference on. IEEE, 2010, pp. 687-694.
A. W. Atamli and A. Martin, "Threat-based security analysis for the internet of things," in Secure Internet of Things (SIoT), 2014 International Workshop on. IEEE, 2014, pp. 35-43.
H. Haskamp, M. Meyer, R. Möllmann, F. Orth, and A. W. Colombo, "Benchmarking of existing opc ua implementations for industrie 4.0-compliant digitalization solutions."