1. Abomhara, M., et al. (2015). Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks. Journal of Cyber Security and Mobility, 4(1), 65–88. https://doi.org/10.13052/jcsm2245-1439.414.
2. Antonaci, A., Klemke, R., Stracke, C. M, Specht, M., Spatafora, M., & Stefanova, K. (2017). Gamification to empower information security education. In International gamiFIN conference 2017 (pp. 32–38).
3. April, W. (2017). Orange is the new purple. BlackHat USA, 2017, 1–9. https://www.blackhat.com/docs/us-17/wednesday/us-17-Wright-Orange-Is-The-New-Purple-wp.pdf?ref=hackernoon.com. Accessed 11 Jan 2023.
4. apsdehal. (2020). awesome-ctf. https://github.com/apsdehal/awesome-ctfl. Accessed 11 Jan 2023.
5. Bashir, M., Lambert, A., Guo, B., Memon, N., & Halevi, T. (2015). Cybersecurity competitions: The human angle. IEEE Security & Privacy, 13(5), 74–79. https://doi.org/10.1109/MSP.2015.100.