(1) Georgia Tech Research Institute Cyber Technology and Information Security Laboratory.
(2) https://www.nitrd.gov/nitrdgroups/images/6/6a/Cyber_Physical_Systems_CPS...
(3) T Stadelmann, K Stockinger, M Braschler, M Cieliebak, G Baudinot, O Drr and A Ruck-stuhl, “Applied data science in europe, challenges for academia in keeping up with a highly demanded topic,”
(4) Y Zhu and Y Xiong, “Defining data science,”
(5) IoTGSI, “Internet of things global standards initiative,” ITU. Retrieved 26 June 2015, 2015.
(6) IoTGSI, “Internet of things global standards initiative,” ITU. Retrieved 1 June 2016, 2016.
(7) ITU, The Internet of Things. 2005.
(8) K Rose, S Eldridge and L Chapin, The Internet of Things an Overview. 2015.
(9) J A Stankovic, “Research directions for the internet of things,” IEEE INTERNET OF THINGS JOURNAL, FEBRUARY 2014, vol. 1, no. 1, 2014.
(10) M Dunn, “A comparative analysis of cybersecurity initiatives worldwide,” INTERNA-TIONAL TELECOMMUNICATION UNION, WSIS Thematic Meeting on Cybersecurity 2005.
(11) G A Wright and T N Schaetzel, “Cyber security: Designing and maintaining resilience,”
(12) E A Fischer, “Cybersecurity issues and challenges: In brief,” Congressional Research Service 2016, 2016.
(13) R Rajkumar, I Lee, L Sha and J Stankovic, “Cyber-physical systems: The next computing revolution,” Design Automation Conference 2010, Anaheim, California, USA, 2010.
(14) IEEE Internet of Things, Towards a definition of the Internet of Things (IoT), Revision1–Published 27 MAY 2015
(15) https://www.nsf.gov/funding/pgm_summ.jsp?pims_id=503286
(16) Proceedings of the National workshop on ICPS held at IITBHU, Varanasi, 2016