1. A survey on web application vulnerabilities (SQLIA, XSS) exploitation and security engine for SQL injection;R Johari;2012 international conference on communication systems and network technologies,2012
2. Cybersecurity of critical infrastructure;Eleonora Vigan�;The Ethics of Cybersecurity,2020
3. Reducing resource and energy consumption in cryptocurrency mining by using both proof-of-stake algorithm and renewable energy;Lokesh Gundaboina;2022 International Mobile and Embedded Technology Conference (MECON),2004
4. A survey of password attacks and comparative analysis on methods for secure authentication;M Raza;World Applied Sciences Journal,2012
5. Man-in-the-Middle Attack to the HTTPS Protocol;F Callegati;IEEE Security & Privacy,2009