1. Some cyber security hygienic protocols for teleworkers in COVID-19 pandemic period and beyond;Abukari Arnold Mashud;International Journal of Scientific & Engineering Research,2020
2. Acronis. 2021 . Cyberthreats Report: Mid-year 2021. Retrieved from https://dl.acronis.com/u/rc/White-Paper-Acronis-Cyber-Protect-Cloud-Cyberthreats-Report-Mid-year-2021-EN-US.pdf Acronis. 2021. Cyberthreats Report: Mid-year 2021. Retrieved from https://dl.acronis.com/u/rc/White-Paper-Acronis-Cyber-Protect-Cloud-Cyberthreats-Report-Mid-year-2021-EN-US.pdf
3. Andrew Adams , Tom Siu , Julie Songer , and Von Welch . 2021. Research at Risk: Ransomware attack on Physics and Astronomy Case Study . NSF Cybersecurity Center of Excellence , Trusted CI , trustedci.org. Retrieved from http://hdl.handle.net/ 2022 /26638 Andrew Adams, Tom Siu, Julie Songer, and Von Welch. 2021. Research at Risk: Ransomware attack on Physics and Astronomy Case Study. NSF Cybersecurity Center of Excellence, Trusted CI, trustedci.org. Retrieved from http://hdl.handle.net/2022/26638
4. Challenges and strategies in the recruitment of participants for qualitative research;Archibald Mandy M.;University of Alberta Health Sciences Journal,2015
5. Bilal Alhayani , Husam Jasim Mohammed , Ibrahim Zeghaiton Chaloob , and Jehan Saleh Ahmed . 2021 . Effectiveness of artificial intelligence techniques against cyber security risks apply of IT industry . Materials Today: Proceedings. DOI: https://doi.org/10 .1016/j.matpr.2021.02.531 10.1016/j.matpr.2021.02.531 Bilal Alhayani, Husam Jasim Mohammed, Ibrahim Zeghaiton Chaloob, and Jehan Saleh Ahmed. 2021. Effectiveness of artificial intelligence techniques against cyber security risks apply of IT industry. Materials Today: Proceedings. DOI: https://doi.org/10.1016/j.matpr.2021.02.531