1. Purohit, L., Kumar, S.: Web services in the Internet of Things and smart cities: a case study on classification techniques. IEEE Consum. Electron. Mag. 8(2), 39–43 (2019)
2. Camacho, D.: Bio-inspired clustering: basic features and future trends in the era of Big Data. In: IEEE International Conference on Cybernetics (2015)
3. Xi, R.R., Yun, X.C., Zhang, Y.Z., Hao, Z.Y.: An improved quantitative evaluation method for network security. Chin. J. Comput. 38(4), 749–758 (2015)
4. Pawar, M.V., Anuradha, J.: Network security and types of attacks in network. Procedia Comput. Sci. 48, 503–506 (2015)
5. Yan, F., Jian-Wen, Y., Lin, C.: Computer network security and technology research. In: 2015 Seventh International Conference on Measuring Technology and Mechatronics Automation, pp. 293–296. IEEE (2015)