1. Security challenges and cyber forensic ecosystem in IoT driven BYOD environment;Ali;IEEE Access,2020
2. Balkan Insights. (2020). Hackers Expose Gaping Holes in North Macedonia's IT Systems| Balkan Insight. https://balkaninsight.com/2020/05/22/hackers-expose-gaping-holes-in-north-macedonias-it-systems/
3. D'Arcy, J., & Hovav, A. (2008). An Integrative Framework for the Study of Information Security Management Research. https://doi.org/10.4018/9781599048550.ch006
4. Dick, E. (2021). Balancing User Privacy and Innovation in Augmented and Virtual Reality.
5. Thoughts on the evolution of national security in cyberspace;Dobák;Security and Defence Quarterly,2021