Hackers can hijack Wi-Fi Hello Barbie to spy on your children,“ The Guardian, [Online]. Available:
„Shodan search exposes insecure SCADA systems,“, [Online]. Available:
„Hackers Remotely Kill a Jeep on the Highway—With Me in It,“, [Online]. Available:
[4], „Employees connect nuclear plant to the internet so they can mine cryptocurrency,“ [Online]. Available:
„Researchers remotely kill the engine of a moving car by hacking vulnerable car dongle,“ [Online]. Available:
„Video Shows a Terrifying Drug Infusion Pump Hack in Action,“ [Online]. Available:
„The Jeep Hackers Are Back to Prove Car Hacking Can Get Much Worse,“, [Online]. Available:
J. Dürrwang, J. Braun, M. Rumez, R. Kriesten und A. Pretschner, „Enhancement of automotive penetration testing with threat analyses results,“ SAE International Journal of Transportation Cybersecurity and Privacy, 2018.
E. Mahmoud Hashem und N. Qiang, „Driving with sharks: Rethinking connected vehicles with vehicle cybersecurity,“ IEEE Vehicular Technology Magazine, 2017.
„BMW and Hyundai hacked by Vietnamese hackers, report claims,“ [Online]. Available:
„Daimler and BMW's car-sharing service was reportedly hacked in Chicago and up to 100 luxury cars are missing or stolen,“ [Online]. Available:
„Experts: North Korea Targeted U.S. Electric Power Companies,“ NBC News, [Online]. Available:
„ISO/SAE DIS 21434 Road vehicles - Cybersecurity engineering,“ [Online]. Available:
„IEC 62443 - Industrial Security,“ [Online]. Available:
„NIST Cybersecurity Framework,“ National Institute of Standards and Technology (NIST), [Online]. Available:
„Task Force on Cyber Security and (OTA) software updates (CS/OTA),“ UNECE, [Online]. Available:
„BSI-Kritisverordnung (BSI-KritisV),“ Bundesamt für Sicherheit in der Informationstechnik (BSI), [Online]. Available:
„Security and Privacy in Your Car Study Act,“ United States of America, [Online]. Available:
„Medical Device Regulation (MDR),“ European Union, [Online]. Available:
„Content of Premarket Submissions for Management of Cybersecurity in Medical Devices,“ U.S. Food and Drug Administration, [Online]. Available:
J. Köhler, „Secure Remote Diagnostics for Electronic Control Units in Off-Highway Machines,“ International VDI Conference - Connected Off-Highway Machines, 2017. [Online]
S. Labitzke, „Cyber Security of Agricultural Machines is not even a Feature: How can we afford that?,“ JohnDeere Electronics World Conference, 2017. [Online].
J. Köhler, „Processes Are Only Half the Battle: Organizational and Technical Challenges of Security Engineering,“ International VDI Conference - Connected Off-Highway Machines, 2019. [Online].
S. Labitzke, „Security vernetzter Nutzfahrzeuge - Was wir aus anderen Domänen lernen können,“ CVC Jahrestagung, 2019. [Online].
„Hackers ‘without conscience’ demand ransom from dozens of hospitals and labs working on coronavirus,“ Fortune, 2020. [Online]. Available:
H. Kühner und J. Koehler, „Security Engineering Prozess für den Schienenverkehr,“, 2018. [Online].
„SEI Cert C++ Secure Coding Standard,“ [Online]. Available:
„SEI CERT Oracle Secure Coding Standard for Java,“ [Online]. Available:
F.-X. Standaert, T. G. Malkin und M. Yung, „A unified framework for the analysis of side-channel key recovery attacks,“ Annual international conference on the theory and applications of cryptographic techniques, 2009.
„CERT Secure Coding Standards,“ SEI, [Online]. Available:
AUTOSAR, „Secure Onboard Communication (SecOC),“ [Online]. Available:
OPC, „OPC Unified Architecture (OPC-UA),“ [Online]. Available:
IETF, „RFC 8446 - The Transport Layer Security (TLS) Protocol Version 1.3,“ [Online]. Available: