Sources

[1]
Hackers can hijack Wi-Fi Hello Barbie to spy on your children,“ The Guardian, [Online]. Available: https://www.theguardian.com/technology/2015/nov/26/hackers-can-hijack-wi-fi-hello-barbie-to-spy-on-your-children
[2]
„Shodan search exposes insecure SCADA systems,“ zdnet.com, [Online]. Available: https://www.zdnet.com/article/shodan-search-exposes-insecure-scada-systems/
[3]
„Hackers Remotely Kill a Jeep on the Highway—With Me in It,“ wired.com, [Online]. Available: https://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/
[4]
zdnet.com, „Employees connect nuclear plant to the internet so they can mine cryptocurrency,“ [Online]. Available: https://www.zdnet.com/article/employees-connect-nuclear-plant-to-the-internet-so-they-can-mine-cryptocurrency/
[5]
„Researchers remotely kill the engine of a moving car by hacking vulnerable car dongle,“ [Online]. Available: https://www.computerworld.com/article/3191519/researchers-remotely-kill-the-engine-of-a-moving-car-by-hacking-vulnerable-car-dongle.html
[6]
„Video Shows a Terrifying Drug Infusion Pump Hack in Action,“ [Online]. Available: https://www.wired.com/2015/08/video-shows-terrifying-drug-infusion-pump-hack-action/
[7]
„The Jeep Hackers Are Back to Prove Car Hacking Can Get Much Worse,“ wired.com, [Online]. Available: https://www.wired.com/2016/08/jeep-hackers-return-high-speed-steering-acceleration-hacks/
[8]
J. Dürrwang, J. Braun, M. Rumez, R. Kriesten und A. Pretschner, „Enhancement of automotive penetration testing with threat analyses results,“ SAE International Journal of Transportation Cybersecurity and Privacy, 2018.
[9]
E. Mahmoud Hashem und N. Qiang, „Driving with sharks: Rethinking connected vehicles with vehicle cybersecurity,“ IEEE Vehicular Technology Magazine, 2017.
[10]
„BMW and Hyundai hacked by Vietnamese hackers, report claims,“ [Online]. Available: https://www.zdnet.com/article/bmw-and-hyundai-hacked-by-vietnamese-hackers-report-claims/
[11]
„Daimler and BMW's car-sharing service was reportedly hacked in Chicago and up to 100 luxury cars are missing or stolen,“ [Online]. Available: https://www.businessinsider.com/daimler-and-bmws-car-sharing-service-reportedly-hacked-in-chicago-2019-4?r=DE&IR=T
[12]
„Experts: North Korea Targeted U.S. Electric Power Companies,“ NBC News, [Online]. Available: https://www.nbcnews.com/news/north-korea/experts-north-korea-targeted-u-s-electric-power-companies-n808996
[13]
„ISO/SAE DIS 21434 Road vehicles - Cybersecurity engineering,“ [Online]. Available: https://www.iso.org/standard/70918.html
[14]
„IEC 62443 - Industrial Security,“ [Online]. Available: https://webstore.iec.ch/publication/64465
[15]
„NIST Cybersecurity Framework,“ National Institute of Standards and Technology (NIST), [Online]. Available: https://www.nist.gov/cyberframework
[16]
„Task Force on Cyber Security and (OTA) software updates (CS/OTA),“ UNECE, [Online]. Available: https://wiki.unece.org/pages/viewpage.action?pageId=40829521
[17]
„BSI-Kritisverordnung (BSI-KritisV),“ Bundesamt für Sicherheit in der Informationstechnik (BSI), [Online]. Available: https://www.bmi.bund.de/SharedDocs/downloads/DE/veroeffentlichungen/2016/kritis-vo.html
[18]
„Security and Privacy in Your Car Study Act,“ United States of America, [Online]. Available: https://www.congress.gov/bill/115th-congress/house-bill/701
[19]
„Medical Device Regulation (MDR),“ European Union, [Online]. Available: https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32017R0745&from=DE
[20]
„Content of Premarket Submissions for Management of Cybersecurity in Medical Devices,“ U.S. Food and Drug Administration, [Online]. Available: https://www.fda.gov/regulatory-information/search-fda-guidance-documents/content-premarket-submissions-management-cybersecurity-medical-devices.
[21]
J. Köhler, „Secure Remote Diagnostics for Electronic Control Units in Off-Highway Machines,“ International VDI Conference - Connected Off-Highway Machines, 2017. [Online]
[22]
S. Labitzke, „Cyber Security of Agricultural Machines is not even a Feature: How can we afford that?,“ JohnDeere Electronics World Conference, 2017. [Online].
[23]
J. Köhler, „Processes Are Only Half the Battle: Organizational and Technical Challenges of Security Engineering,“ International VDI Conference - Connected Off-Highway Machines, 2019. [Online].
[24]
S. Labitzke, „Security vernetzter Nutzfahrzeuge - Was wir aus anderen Domänen lernen können,“ CVC Jahrestagung, 2019. [Online].
[25]
„Hackers ‘without conscience’ demand ransom from dozens of hospitals and labs working on coronavirus,“ Fortune, 2020. [Online]. Available: https://fortune.com/2020/04/01/hackers-ransomware-hospitals-labs-coronavirus/
[26]
H. Kühner und J. Koehler, „Security Engineering Prozess für den Schienenverkehr,“ https://safe.tech/, 2018. [Online].
[27]
„SEI Cert C++ Secure Coding Standard,“ [Online]. Available: https://wiki.sei.cmu.edu/confluence/pages/viewpage.action?pageId=88046682
[28]
„SEI CERT Oracle Secure Coding Standard for Java,“ [Online]. Available: https://wiki.sei.cmu.edu/confluence/display/java/SEI+CERT+Oracle+Coding+Standard+for+Java
[29]
F.-X. Standaert, T. G. Malkin und M. Yung, „A unified framework for the analysis of side-channel key recovery attacks,“ Annual international conference on the theory and applications of cryptographic techniques, 2009.
[30]
„CERT Secure Coding Standards,“ SEI, [Online]. Available: https://wiki.sei.cmu.edu/confluence/display/seccode.
[31]
AUTOSAR, „Secure Onboard Communication (SecOC),“ [Online]. Available: https://www.autosar.org/standards.
[32]
OPC, „OPC Unified Architecture (OPC-UA),“ [Online]. Available: https://opcfoundation.org/about/opc-technologies/opc-ua/.
[33]
IETF, „RFC 8446 - The Transport Layer Security (TLS) Protocol Version 1.3,“ [Online]. Available: https://tools.ietf.org/html/rfc8446.