1. (CyRC) CRC (2021) 2021 software vulnerability snapshot. Synopsys. https://www.synopsys.com/software-integrity/resources/analyst-reports/software-vulnerability-trends.html?cmp=pr-sig&utm_medium=referral
2. Alvarez-Cedillo JA, Perez-Romero P, Hernandez-Bolaños M (2012) Bluetooth intrusion techniques. IRACST-International J Comput Sci Inform Technol Secur (IJCSITS) 2(1):208–215
3. Arif JM, Ab Razak MF, Mat SRT, Awang S, Ismail NSN, Firdaus A (2021) Android mobile malware detection using fuzzy AHP. J Inf Secur Appl 61:102929
4. Berghof T (2020) Malware Top 10 in 2019: attacks every few seconds. https://www.gdatasoftware.com/news/2020/01/35727-malware-top-10-in-2019-attacks-every-few-seconds
5. Bosaeed S, Katib I, Mehmood RA (2020) Fog-augmented machine learning based SMS spam detection and classification system. In: 2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC). IEEE, pp 325–330