1. F5 Lab. (2012). Application protection reprt. F5 Lab. Retrieved May 12, 2023, from https://www.f5.com/content/dam/f5-labs-v2/article/pdfs/F5-Labs-2021-Application-Protection-Report-24AUG21.pdf
2. Abdul-Hussein, M. (2023). Review: Network Intrusion Detection Systems for Attack Detection and Prevention. iasj.net. https://www.iasj.net/iasj/download/c6544ecec16b3966
3. Accenture. (2020a). CYBER THREATSCAPE REPORT 2020 - Accenture Security. Retrieved May 12, 2023, from https://www.readkong.com/page/cyber-threatscape-report-2020-accenture-security-6648512
4. Accenture. (2020b). The Cost of Cybercrime: Annual Study by Accenture. Retrieved May 12, 2023, from https://iapp.org/resources/article/the-cost-of-cybercrime-annual-study-by-accenture/
5. Admin. (2022a, January 20). The impact of e-commerce on the logistics industry. Globalia Blog. https://www.globalialogisticsnetwork.com/blog/2021/10/07/e-commerce-and-logistics-how-the-logistics-industry-is-changing-due-to-the-rise-of-e-commerce/