1. Afaq, S.A., Husain, M.S., Bello, A., Sadia, H.: A critical analysis of cyber threats and their global impact. In: Computational Intelligent Security in Wireless Communications, pp. 201–220. CRC Press (2022)
2. Spring, J., Hatleback, E., Manion, A., Shic, D.: Towards improving CVSS. Software Engineering Institute Carnegie Mellon University (2018)
3. Dey, D., Lahiri, A., Zhang, G.: Optimal policies for security patch management. INFORMS J. Comput. 27(3), 462–477 (2015)
4. Lawson, C., Schneider, M., Bhajanka, P., Gardner, D.: Market Guide for Vulnerability Assessment (2019). https://www.gartner.com/en/documents/3975388. Accessed 19 May 2022
5. Andress, J.: Foundations of Information Security: A Straightforward Introduction. No Starch Press, San Francisco (2019)