1. Mivule K. Utilizing noise addition for data privacy, an overview. In: Proceedings of the International Conference on Information and Knowledge Engineering (IKE 2012). 2012. pp. 65-71
2. Brundage M, Avin S, Clark J, Toner H, Eckersley P, Garfinkel B, et al. The malicious use of artificial intelligence: Forecasting, prevention, and mitigation. Design Direction [Internet]. 2018:1-101. Available from: https://arxiv.org/pdf/1802.07228.pdf [Accessed: 24 March 2020]
3. Diamond B, Bachmann M. Out of the beta phase: Obstacles, challenges, and promising paths in the study of cyber criminology. International Journal of Cyber Criminology [Internet]. 2015;9(1):24-34. Available from: http://www.cybercrimejournal.com [Accessed: 03 April 2020]
4. Snoke J, Bowen CM. Differential privacy: What is it? AMSTAT News [Internet]. 2019. Available from: https://magazine.amstat.org/blog/2019/03/01/differentialprivacy/ [Accessed: 03 April 2020]
5. Wilner AS. Cybersecurity and its discontents: Artificial intelligence, the Internet of Things, and digital misinformation. International Journal: Canada’s Journal of Global Policy Analysis [Internet]. 2018;73(2):308-316. DOI: 10.1177/0020702018782496. Available from: http://journals.sagepub.com [Accessed: 17 April 2020]