1. A survey of emerging threats in cybersecurity;Jang-Jaccard;J. Comput. System Sci.,2014
2. Differentially private model publishing in cyber physical systems;Zhu;Future Gener. Comput. Syst.,2020
3. Microsoft Exchange Flaw: Attacks Surge After Code Published. URL https://www.bankinfosecurity.com/ms-exchange-flaw-causes-spike-in-trdownloader-gen-trojans-a-16236.
4. American Information Technology Laboratory. National Vulnerability Database. URL https://nvd.nist.gov/.
5. Understanding the Impact of Apache Log4j Vulnerability. URL https://security.googleblog.com/2021/12/understanding-impact-of-apache-log4j.html.