1. Enhancing Risk-Based Decisions by Leveraging Cyber Security Automation;AlSadhan,2016
2. Barak, E., (2016): Explaining security automation and its evolving definitions, IDG Communications, Inc, New York, NY. Available at: www.networkworld.com/article/3121275/explaining-securityautomation-and-its-evolving-definitions.html. Accessed: 9th December 2022.
3. Cynet, (2022): What is Security Automation? Tools, Process and Best Practices. Available at: https://www.cynet.com/incident-response/security-automation-tools-process-and-best-practices. Accessed: 6th December 2022.
4. Resilience Assessment in Electricity Critical Infrastructure from the Point of View of Converged Security;Hromada;Energies,2021
5. ISC2, (2022): Cybersecurity Workforce Study, A critical need for cybersecurity professionals persists amidst a year of cultural and workplace evolution. Available at: https://www.isc2.org//-/media/ISC2/Research/2022-WorkForce-Study/ISC2-Cybersecurity-Workforce-Study.ashx, Accessed: 5th December 2022.