1. Westcott Sean Westcott Jean Riescher. Cybersecurity:An Introduction[M].Mercury Learning and Information:2021-06-03. Westcott Sean Westcott Jean Riescher. Cybersecurity:An Introduction[M].Mercury Learning and Information:2021-06-03.
2. A. G. Burtsev D. M. Klishevich A. V. Polyanskii. Protection of standard network protocols of automated production control systems[J]. Russian Engineering Research 2017 37(3). A. G. Burtsev D. M. Klishevich A. V. Polyanskii. Protection of standard network protocols of automated production control systems[J]. Russian Engineering Research 2017 37(3).
3. Mohammed I. Al-Saleh ,Fatima M. AbuHjeela ,Ziad A. Al-Sharif . Investigating the detection capabilities of antiviruses under concurrent attacks[J]. International Journal of Information Security , 2015 ,14(4): Mohammed I. Al-Saleh,Fatima M. AbuHjeela,Ziad A. Al-Sharif. Investigating the detection capabilities of antiviruses under concurrent attacks[J]. International Journal of Information Security,2015,14(4):
4. Computer System and Network Security
5. Gupta C P Goyal K K. Cybersecurity:A Self-Teaching Introduction[M].Mercury Learning & Information:2020-03-17. Gupta C P Goyal K K. Cybersecurity:A Self-Teaching Introduction[M].Mercury Learning & Information:2020-03-17.