References
- Department of commerce, "Defense industrial base assessment: Counterfeit electronics", January 2010
- Department of justice, http://www.justice.gov/archive/opa/pr/2008/February/08_crm_150.html
- NetMarketShare, "Mobile/Tablet Operating System Market Share", December 2015
- Palo alto networks, http://researchcenter.paloaltonetworks.com/2015/09/update-xcodeghost-attacker-can-phish-passwords-and-open-urls-though-infected-apps/
- Dailymail, http://www.dailymail.co.uk/wires/ap/article-2647551/Man-pleads-guilty-counterfeit-sub-parts-case.html
- NRC Regulatory Guide 5.71, "Cyber Security Programs for Nuclear Facilities", January 2010
- NRC, 10 CFR 73.54, "Protection of digital computer and communication systems and network", November 2009
- NRC, http://www.nrc.gov/public-involve/conference-symposia/ric/past/2014/docs/posters/53-nsircurrent-status-of-cyber-security-implementation.pdf
- NRC Regulatory Guide 1.152, "Criteria for use of computers in safety systems of nuclear power plants Rev 3", July 2011
- NRC, http://www.nrc.gov/reading-rm/basic-ref/glossary/safety-related.html
- NIST SP 800.53, "Security and Privacy Controls for Federal Information Systems and Organizations", February 2014
- IAEA-TECDOC-919 "Procurement Engineering and Supply Chain Guidelines in Support of Operation and Maintenance of Nuclear Power Plants", December 1996
- IAEA-TECDOC-1169 "Managing Suspect and CounterFeit Items in the Nuclear Industry", August 2000