References
[1]. El-Hadary, H., & El-Kassas, S. (2014). Capturing
security requirements for software systems. Journal of
Advanced Research, 5(4), 463-472.
[2]. Elmaghraby, A. S., & Losavio, M. M. (2014). Cyber
security challenges in Smart Cities: Safety, security and
privacy. Journal of Advanced Research, 5(4), 491-497.
[3]. Gronau, N. (2016). Determinants of an appropriate
degree of autonomy in a cyber-physical production
system. Procedia CIRP, 52, 1-5.
[4]. Gualdoni, J., Kurtz, A., Myzyri, I., Wheeler, M., & Rizvi,
S. (2017). Secure Online Transaction Algorithm: Securing
Online Transaction using Two-Factor Authentication.
Procedia Computer Science, 114, 93-99.
[5]. Gupta, G. P., & Kulariya, M. (2016). A framework for
fast and efficient cyber security network intrusion detection using Apache Spark. Procedia Computer
Science, 93, 824-831.
[6]. Ijaz, S., Shah, M. A., Khan, A., & Ahmed, M. (2016).
Smart cities: A survey on security concerns. International
Journal of Advanced Computer Science and
Applications, 7(2), 612-625.
[7]. Ilie-Zudor, E., Kemény, Z., & Preuveneers, D. (2016).
Efficiency and security of process transparency in
production networks-a view of expectations, obstacles
and potentials. Procedia CIRP, 52, 84-89.
[8]. Kristian, Y., Armanto, H., & Frans, M. (2012). Utilizing
GPS and SMS for Tracking and Security Lock Application on
Android based Phone. Procedia-Social and Behavioral
Sciences, 57, 299-305.
[9]. Lacinák, M., & Jozef, R. (2017). Smart city, Safety and
Security. International Scientific Conference on
Sustainable, Modern and Safe Transport, Procedia
Engineering, 192 (2017), 522-527.
[10]. Lovati, V., Palmieri, G., Gervasini, S., & Colombo, A.
M. (2012). An ID-Card based security system for railway
applications. Procedia-Social and Behavioral Sciences,
48, 234-245.
[11]. Zhu, J., Xie, J., Lipford, H. R., & Chu, B. (2014).
Supporting secure programming in web applications
through interactive static analysis. Journal of Advanced
Research, 5(4), 449-462.