1. Buchyk S., Yudin O., Ziubina R., Bondarenko I., Suprun O.: Devising a method of protection against zero-day attacks based on an analytical model of changing the state of the network sandbox. Eastern-Europ. J. Enterprise Technol. 1/9(109), 50–57 (2021). http://journals.uran.ua/eejet/article/view/225646
2. Toliupa, S., Buchyk, S., Nakonechnyi, V., Saiko, V., Parkhomenko, I., Lukova-Chuiko, N.: Building an intrusion detection system in critically important information networks with application of data mining methods. In: 16th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering (TCSET), Lviv-Slavske, Ukraine, pp. 128–133, 22–26 Feb 2022. https://doi.org/10.1109/TCSET55632.2022.9767029
3. Bissell, G., Fox, J., LaSalle, R., Cin, P.: How aligning security and the business creates cyber resilience [Electronic resource]. In: Kelly, B., Jacky, F., Ryan, L., Paolo, C. (eds.) State of Cybersecurity Resilience , 8р (2021)
4. Countries most targeted by phishing attacks worldwide in 2021 [Electronic resource]. Access: https://www.statista.com/statistics/266362/phishing-attacks-country/
5. Nieles, M., Dempsey, K., Pillitteri, V.: An introduction to information security [Electronic resource]. In: Michael, N., Kelley, D., Victoria P. (eds.) NIST Special Publication 800-12 Revision 1, 221р (2017). Access: https://datatracker.ietf.org/doc/html/rfc4949