1. M. Novak, The internet's save-the-date: a tiny item in a UCLA student newspaper, 30 July 2013,
https://paleofuture.gizmodo.com/the-internets-save-the-date-a-tiny-item-in-a-ucla-stud-898064971
2. M. Hasan, R. Khan, Network threats, attacks and security measures: a review. Curr. Issues Int. J. Adv. Res. Comput. Sci. 8, 8 (2017),
https://ijarcs.info/index.php/Ijarcs/article/view/4641
3. M.S. Gaigole, M.A. Kalyankar, The study of network security with its penetrating attacks and possible security mechanism. Curr. Issues IJCSMC 4(5), 728–735 (2015),
www.ijcsmc.com
4. F. Doelitzscher, C. Reich, M. Knahl, A. Passfall, N. Clarke, An agent-based business-aware incident detection system for cloud environments. Curr. Issues J Cloud Comput.: Adv. Syst. Appl. (2012),
https://www.journalofcloudcomputing.com/content/1/1/9
5. R. Tolido, A.L. Thieullent, G. Linden, A. Frank et al., Reinventing cybersecurity with artificial intelligence: the new frontier in digital security. Report by Capgemini Research Institute, pp. 3–9, 17 (2019),
https://www.capgemini.com/wp-content/uploads/2019/07/AI-in-Cybersecurity_Report_20190711_V06.pdf