1. A survey of emerging threats in cybersecurity;Jang-Jaccard;J. Comput. Syst. Sci.,2014
2. E-Retailing practices in mobile marketing: the case of getir application;Eken,2020
3. Intrusion detection technique using hypothesis testing;Aladesote;Proceed. World Congr. Eng. Comput. Sci.,2014
4. The state of the art in intrusion prevention and detection;Pathan,2014
5. O.A. Sarumi, C.K. Leung, Scalable data science and machine learning algorithm for gene prediction, In: The 7th International Conference on Big Data Applications (2019) 118–126.