1. Apr 19, D.H.K.•, 2020: FBI: Covid-19 Cyberattacks Spike 400% in Pandemic, https://www.msspalert.com/cybersecurity-news/fbi-covid-19-cyberattacks-spike-400-in-pandemic/, last accessed 2022/03/25.
2. Bar-Yam, Y.: General Features of Complex Systems. UNESCO Encyclopedia of Life Support Systems. (2002).
3. Ding, M. et al.: An efficient Public Key Encryption with Conjunctive Keyword Search scheme based on pairings. In: 2012 3rd IEEE International Conference on Network Infrastructure and Digital Content. pp. 526–530 (2012). https://doi.org/10.1109/ICNIDC.2012.6418809.
4. Ferrill, T.: 10 security tools all remote employees should have, https://www.csoonline.com/article/3625882/10-security-tools-all-remote-employees-should-have.html, last accessed 2022/03/25.
5. Goh, E.-J.: Secure Indexes. (2003).