1. Bajpai, P. (2022). An overview of the cybersecurity landscape and ways to invest in the space. Nasdaq. https://www.nasdaq.com/articles/an-overview-of-the-cybersecurity-landscape-and-ways-to-invest-in-the-space
2. Borgman, C., & Furner, J. (1990). Scholarly Communication and Bibliometrics. Sage.
3. Bródka, P., Skibicki, K., Kazienko, P., & Musial, K. (2012). A degree centrality in multi-layered social network. CoRR, abs/1210.5184. http://arxiv.org/abs/1210.5184
4. Chen, C. (2003). On the shoulders of giants. In Mapping scientific frontiers: The quest for knowledge visualization (pp. 135–166). Springer. https://doi.org/10.1007/978-1-4471-0051-5_5
5. Choucri, N. (2014). Institutions for cyber security: International responses and global imperatives. Information Technology for Development, 20(2), 96–121. https://doi.org/10.1080/02681102.2013.836699