(1)    Georgia Tech Research Institute Cyber Technology and Information Security Laboratory.
(3)    T Stadelmann, K Stockinger, M Braschler, M Cieliebak, G Baudinot, O Drr and A Ruck-stuhl, “Applied data science in europe, challenges for academia in keeping up with a highly demanded topic,”
(4)    Y Zhu and Y Xiong, “Defining data science,”
(5)    IoTGSI, “Internet of things global standards initiative,” ITU. Retrieved 26 June 2015, 2015.
(6)    IoTGSI, “Internet of things global standards initiative,” ITU. Retrieved 1 June 2016, 2016.
(7)    ITU, The Internet of Things. 2005.
(8)    K Rose, S Eldridge and L Chapin, The Internet of Things an Overview. 2015.
(9)    J A Stankovic, “Research directions for the internet of things,” IEEE INTERNET OF THINGS JOURNAL, FEBRUARY 2014, vol. 1, no. 1, 2014.
(10)    M Dunn, “A comparative analysis of cybersecurity initiatives worldwide,” INTERNA-TIONAL TELECOMMUNICATION UNION, WSIS Thematic Meeting on Cybersecurity 2005.
(11)    G A Wright and T N Schaetzel, “Cyber security: Designing and maintaining resilience,”
(12)    E A Fischer, “Cybersecurity issues and challenges: In brief,” Congressional Research Service 2016, 2016.
(13)    R Rajkumar, I Lee, L Sha and J Stankovic, “Cyber-physical systems: The next computing revolution,” Design Automation Conference 2010, Anaheim, California, USA, 2010.
(14)    IEEE Internet of Things, Towards a definition of the Internet of Things (IoT), Revision1–Published 27 MAY 2015
(16)    Proceedings of the National workshop on ICPS held at IITBHU, Varanasi, 2016