1. Reagin, M.J., Gentry, M.V.: Enterprise cybersecurity: building a successful defense program. Front Health Serv. Manage. 35(1), 13–22 (2018)
2. Zhuo, M., Liu, L., Zhou, S.: Survey on security issues of routing and anomaly detection for space information networks. Tian Z. Sci. Rep. 21(18), 61–63 (2021)
3. Yang, W.C., Wang, S., Sahri, N.M., Karie, N.M., Ahmed, M., Valli, C.: Biometrics for Internet-of-Things security: a review. Sensors (Basel) 21(18), 61–63 (2021)
4. Chugh, R., Guggisberg, M.: Stalking and other forms of dating violence: lessons learned from you in relation to cyber safety. J. Interpers. Violence 10(1), 11–19 (2020)
5. Carbonell, X., Chamarro, A., Oberst, U., Rodrigo, B., Prades, M.: Problematic use of the internet and smartphones in university students: 2006–2017. Int. J. Environ. Res. Public Health 15(3), 475–479 (2018)