References

Building Capacity by Guarding Against Cyber Attacks. (2020). Journal of Environmental Health, 83(4), 28–29.   https://search-ebscohost-com.citytech.ezproxy.cuny.edu/login.aspx?direct=true&db=hch&AN=146661660&site=ehost-live&scope=site
Krundyshev, V., & Kalinin, M. (2020). Prevention of cyber attacks in smart manufacturing applying modern neural network methods. IOP Conference Series.Materials Science and Engineering, 940(1) doi:http://dx.doi.org/10.1088/1757-899X/940/1/012011 
Rowe, N. C. (2007). Cyber Attacks. In A.-V. Anttiroiko & M. Malkia (Eds.),  Encyclopedia of Digital Government (Vol. 1, pp. 271-276). Idea Group Reference.  https://link.gale.com/apps/doc/CX3467800051/GVRL?u=cuny_nytc&sid=bookmark-GVRL&xid=7888af64 
What is a cyber attack? Check Point Software. (2021, December 12). Retrieved December 14, 2021, from https://www.checkpoint.com/cyber-hub/cyber-security/what-is-cyber-attack/ 
Zhang, W., Wang, Z., Liu, Y., Ding, D., & Alsaadi, F. E. (2017, June 20). Sampled data consensus of Nonlinear Multiagent Systems subject to cyber attacks. Wiley Online Library. Retrieved November 21, 2021, from https://onlinelibrary.wiley.com/doi/abs/10.1002/rnc.3855