Page 108 - Cyber Terrorism and Extremism as Threat to Critical Infrastructure Protection
P. 108
SECTION II: CYBER TERRORISM AND SECURITY IMPLICATION FOR CRITICAL INFRASTRUCTURE PROTECTION
18. Dutton Tim, (June 28, 2018), “An Overview of National AI Strategies”, Medium.com, accessed at:
https://medium.com/politics-ai/an-overview-of-national-ai-strategies-2a70ec6edfd
19. Euhus T. Brandon, (2019), “A Clausewitzian Response to “Hyperwarfare””, Parameters, accessed at:
https://www.questia.com/library/journal/1G1-580097642/a-clausewitzian-response-to-hyperwarfare)
20. European Commission, (February 19, 2020), “White Paper, On Artificial Intelligence – a European
approach to excellence and trust”, COM(2020) 65 final, p10, accessed at: https://ec.europa.eu/info/
sites/info/files/commission-white-paper-artificial-intelligence-feb2020_en.pdf
21. F2N2, (December 21, 2019), “Russia’s Strategic Interests and Tools of Influence in the Western
Balkans” , accessed at: https://f2n2.mk/en/russias-strategic-interests-and-tools-of-influence-in-the-
western-balkans/
22. Feyerabend C. Florian, (2018), “The influence of external actors in the Western Balkans”, Konrad
Adenauer Stifrung, accessed at: https://www.kas.de/c/document_library/get_file?uuid=194afc48-
b3be-e3bc-d1da-02771a223f73&groupId=252038
23. Fitzgerald Ian, (2019), “Securing Critical Infrastructure with Artificial Intelligence”, CIO Review,
accessed at: https://cybersecurity.cioreview.com/cioviewpoint/securing-critical-infrastructure-with-
artificial-intelligence-nid-26995-cid-145.html
24. Follath Erich & Stark Holger, (November 2, 2009), “The Story of ‘Operation Orchard’: How Israel
Destroyed Syria’s Al Kibar Nuclear Reactor”, Spiegel Online International, accessed at: http://
www.spiegel.de/international/world/the-story-of-operation-orchard-how-israel-destroyed-syria-s-
al-kibar-nuclear-reactor-a-658663.html
25. Fuller B. Richard, (1982), Critical Path. Library of Congress.
26. Geer David, (February 12, 2014), “Statistics point to increased physical danger risks of cyberterror-
ism”, CSO Online, accessed at: http://www.csoonline.com/article/2134376/malware-cybercrime/
statistics-point-to-increased-physical-danger-risks-of-cyberterrorism.html
27. GLOBSEC, (2018), “Future War NATO? From Hybrid War to Hyper War via Cyber War”. GLOB-
SEC.
28. Hadji-Janev, Metodi, (2012) “Managing the consequences of terrorist attacks: the case of Mace-
donia”, in: Chaleta D. & Shemella P. (Eds.) Managing the Consequences of Terrorist Acts - Ef-
ficiency and Coordination Challenges, 2012, ISBN: 978-961-92860-5-0, available at: http://www.
ics-institut.com/research/books/4.
29. Hadji-Janev, Metodi and Jovanovski, Vlatko (2013) The concept of resilience and protection of
critical infrastructure against natural and man-made disasters in Republic of Macedonia”. In: Book
of Papers 6th International Conference “Crisis Management Days”, Nova Gorica, 6th Interna-
tional Conference.
30. Heffelfinger Christopher, (July 2013), “The Risks Posed by Jihadist Hackers”, CTC Sentinel, Vol.6
Issue 7, accessed at: https://ctc.usma.edu/the-risks-posed-by-jihadist-hackers/
31. HPC, (July 29, 2019) “AI Enters the Front Lines of National Defence and Security”, HPC Wire
com, accessed at: https://www.hpcwire.com/2019/07/29/ai-enters-the-front-lines-of-national-
defence-and-security/)
32. Ismail Nick, (January 22, 2018), “The Internet of Things: The security crisis of 2018?”, Informa-
tion Age, accessed at: https://www.information-age.com/internet-things-security-crisis-123470475/
33. Jans Karlijn, (July 10, 2018), “NATO Needs to Get Smarter About AI”, Atlantic Council, accessed
at: https://www.atlanticcouncil.org/blogs/new-atlanticist/nato-needs-to-get-smarter-about-ai/
108