1. A. A. J. Sandoval, how technology is controlling our critical infrastructure, civilians and military working together to minimize cyberattacks, (2019), https://bdex.eb.mil.br/jspui/bitstream/123456789/4942/1/MO%20003_Cel%20Jordan.pdf, Accessed 05 Sep 2023
2. D. Vergun, DOD Aims to improve network security, leverage new technologies, US department of physics, May 2, 2023, https://www.defense.gov/News/News-Stories/Article/Article/3382079/dod-aims-to-improve-network-security-leverage-new-technologies/ Accessed 05 Sep 2023
3. J. Lee, Silicon valley startup sandbox AQ hired to beef up US military cyber security, Reuters, June 27, 2023, https://www.reuters.com/world/us/silicon-valley-startup-sandboxaq-hired-beef-up-us-military-cyber-security-2023-06-27/ Accessed 05 Sep 2023.
4. M. Al-Zubaidie, Z. Zhang, J. Zhang, RAMHU: a new robust lightweight scheme for mutual users authentication in healthcare applications. Secur. Commun. Netw. 2019, 1–26 (2019)
5. R. Kumar, R.A. Khan, Securing communication protocols in military computing. Netw. Secur.. Secur. (2024). https://doi.org/10.12968/S1353-4858(24)70011-7