1. Love J (2018) A brief history of malware—its evolution and impact. Lastline. https://www.lastline.com/blog/history-of-malware-its-evolution-and-impact/
2. Jovanovic B (2021) A not-so-common cold: malware statistics in 2022. Data port. https://dataprot.net/statistics/malware-statistics/
3. Shishkova T (2022) IT threat evolution in Q1 2022. Mobile statistics. Kaspersky. https://securelist.com/it-threat-evolution-in-q1-2022-mobile-statistics/106589/
4. Al-Haija QA, Ishtaiwi A (2022) Multiclass classification of firewall log files using shallow neural network for network security applications. In: Ranganathan G, Fernando X, Shi F, El Allioui Y (eds) Soft computing for security applications . advances in intelligent systems and computing, vol 1397. Springer, Singapore. https://doi.org/10.1007/978-981-16-5301-8_3
5. von Ogden J (nd) 5 places ransomware and malware can hide that you may never check. Cimcor.Com. https://www.cimcor.com/blog/5-places-ransomware-and-malware-can-hide-that-you-may-never-check. Accessed 1 June 2022