1. Cloud computing security threats and attacks with their mitigation techniques;Amara,2017
2. Internet of things security: a survey;Alaba;J Network Comput Appl,2017
3. Amoud, M., and Roudies, O. MAPE-K-based approach for security @ runtime, 2016. pp. 138–140, doi:10.1109/SWSTE.2016.28.
4. Management of information security indicators under a cognitive security model;Andrade,2018
5. Intelligent automated intrusion response system based on fuzzy decision making and risk assessment;Berenjian,2016