1. An ontology for network security attacks;Simmonds,2004
2. Radware (2022). 2022 H1 Global Threat Analysis Report. Retrieved August 14, 2023, from https://www.radware.com/getattachment/ba8a3263-703b-4cc7-a5d0-741dc00e9273/H1-2022-Threat-Analysis-Report_2022_Report-V2.pdf.aspx.
3. Cisco (2018). Cisco Annual Internet Report, 2018–2023. Retrieved August 14, 2023, from https://www.cisco.com/c/en/us/solutions/collateral/executive-perspectives/annual-internet-report/white-paper-c11-741490.html.
4. Fortune Business Insights (2022). Internet of Things (IoT) Market Report. Retrieved August 14, 2023, from https://www.fortunebusinessinsights.com/industry-reports/internet-of-things-iot-market-100307.
5. Dutta, A., Al-Shaer, E., Chatterjee, S. Constraints satisfiability driven reinforcement learning for autonomous cyber defense. arXiv Preprint, 2021. arXiv:2104.08994. https://doi.org/10.48550/arXiv.2104.08994.