1. S. Furnell, in Cybercrime: Vandalizing the Information Society. Addison-Wesley (2002)
2. R. Anderson, C. Barton, R. Böhme, R. Clayton, M.J.G. Eeten, M. Levi, Measuring the cost of cybercrime. the economics of information security and privacy, pp. 265–300 (2012)
3. N. Bhalaji, A novel hybrid routing algorithm with two fish approach in wireless sensor networks. J. Trends Comput. Sci. Smart Technol. 2(3), 134–140 (2020)
4. M. Yar, K.F. Steinmetz, in Cybercrime and Society. 3rd edn. (SAGE, 2006)
5. https://www.hpac.com/building-automation/article/20928349/protecting-facility-networks-from-cyber-attack