[7] Orojloo, H., & Azgomi, M. A. (2017). A method for evaluating the consequence propagation of security attacks in cyber–physical systems.
Future Generation Computer Systems,
67, 57-71.
https://doi.org/10.1016/j.future.2016.07.016
[9] Fathianpour, F., Hendesi, F., & Ayat, S.S., . (2013, February 14). Comparison of methods for identifying the behavior of internal employees in the process of attacking computer systems. 1st payame noor university national conference on information technology & networking, Tabas Branch Payam Noor University, Iran. https://civilica.com/doc/195859/
[11] Tourani, P., Hadavi, M. A., & Jalili, R. (2011, July 4-8).
Access control enforcement on outsourced data ensuring privacy of access control policies. 2011 International Conference on High Performance Computing & Simulation, Istanbul, Turkey.
https://doi.org/10 .1109/HPCSim.2011.5999865
[12] Samimi R., P., B. (2017, March 5).
Examining the legal aspects of soft war in cyber space. National Conference of passive defense in the realm of cyberspace, Maragheh, Iran.
http s://civilica.com/doc/649521/
[17] Nosratabadi, J., Lashkarian, H., Mardani, M., & Movahhedi, M. (2019). Presenting a Critical Assessment Model for the Armed Forces of the Islamic Republic of Iran.
National Security,
9(31), 173-198.
https://ns.sndu.ac.ir/article_480.html?lang=en
[20] Sepehrzadeh, H. (2022). A Method for Assessing the Security Risk in Cyber-Physical Systems with Incomplete Information Using Bayesian Game Theory.
Karafan Quarterly Scientific Journal,
19(1), 495-521.
https://doi.org/10.48301/kssa.2022.320681.1909
[22] Ghoodsi, A. (2014). The Impact of Cyberspace on the National Security of I.R. of Iran and Providing an Approach.
Quarterly Defens Strategy,
11(44), 149-186.
https://ww w.magiran.com/paper/1242759
[23] Solani, R., & Das, M.L. (2021). iCOPS: insider attack detection in distributed file systems.
International Journal of Social Computing and Cyber-Physical Systems,
2(3), 244-255.
https://doi.org/10.1504/ijsccps.2021.117972
[24] Parsons, K., Calic, D., Pattinson, M., Butavicius, M., McCormac, A., & Zwaans, T. (2017). The Human Aspects of Information Security Questionnaire (HAIS-Q): Two further validation studies.
Computers & Security,
66, 40-51.
https://doi.org/10.1016/ j.cose.2017.01.004
[27] Hu, F., Lu, Y., Vasilakos, A. V., Hao, Q., Ma, R., Patil, Y., Zhang, T., Lu, J., Li, X., & Xiong, N. N. (2016). Robust Cyber–Physical Systems: Concept, models, and implementation.
Future Generation Computer Systems,
56(1), 449-475.
https://doi.org/10.1016/j.future.2 015.06.006
[29] Tsigkanos, C., Pasquale, L., Ghezzi, C., & Nuseibeh, B. (2018). On the Interplay Between Cyber and Physical Spaces for Adaptive Security.
IEEE Transactions on Dependable and Secure Computing,
15(3), 466-480.
https://doi.org/10.1109/TDSC.2016.2599880
[30] Krotofil, M., Cárdenas, A., Larsen, J., & Gollmann, D. (2014). Vulnerabilities of cyber-physical systems to stale data—Determining the optimal time to launch attacks.
International Journal of Critical Infrastructure Protection,
7(4), 213-232.
https://do i.org/10.1016/j.ijcip.2014.10.003
[34] Hoehn, A., & Zhang, P. (2016, July 6-8).
Detection of covert attacks and zero dynamics attacks in cyber-physical systems. 2016 American Control Conference, Boston, Massachusetts, USA.
https://doi.org/10.1109/ACC.2016.7524932
[35] Rajamanickam, S., Ramasubramanian, N., & Vollala, S. (2022). Insider Attack Prevention using Multifactor Authentication Protocols - A Survey. In
Applied Information Processing Systems. Springer Singapore.
https://doi.org/10.1007/978-981-16-2008-9_32