1. Data Thieves: The Motivations of Cyber Threat Actors and Their Use and Monetization of Stolen Data
2. Albertson, M. (2020). Cybersecurity 2021: Nation-state hacking, network vulnerability and social media manipulation. https://siliconangle.com/2020/12/07/cy bersecurity-2021-nation-state-hacking-network-vulnerability-social-media-manipulation/
3. AO Kaspersky Lab. (2021). What is cybersecurity? https://usa.kaspersky.com/resource-center/definitions/what-is-cyber-security
4. Introducing Bothunter: A tiered approach to detection and characterizing automated activity on Twitter.;D. M.Beskow;International Conference on Social Computing, Behavioral-Cultural Modeling and Prediction and Behavior Representation in Modeling and Simulation,2018
5. Bot Conversations are Different: Leveraging Network Metrics for Bot Detection in Twitter