1. {n. d.}. ARM Trust Zone. https://www.arm.com/products/security-on-arm/trustzone. {n. d.}. ARM Trust Zone. https://www.arm.com/products/security-on-arm/trustzone.
2. {n. d.}. Intel SGX. https://software.intel.com/en-us/sgx. {n. d.}. Intel SGX. https://software.intel.com/en-us/sgx.
3. {n. d.}. Mirai Attack. https://www.corero.com/resources/ddos-attack-types/mirai-botnet-ddos-attack.html. {n. d.}. Mirai Attack. https://www.corero.com/resources/ddos-attack-types/mirai-botnet-ddos-attack.html.
4. {n. d.}. UCI Machine Learning Repository. https://archive.ics.uci.edu/ml/machine-learning-databases/00442/. {n. d.}. UCI Machine Learning Repository. https://archive.ics.uci.edu/ml/machine-learning-databases/00442/.