1. Using Security Metrics to Determine Security Program Effectiveness
2. Hijawi W. Faris H. Alqatawna J.F. Aljarah I. Al‐Zoubi A. M. Habib M. EMFET: E‐mail Features Extraction Tool 2017 doi:10.13140/RG.2.2.32995.45603.
3. CYBERPUNK 2020 Emagnet: Accurate Leaked Database Crawler
4. Adewopo V. Gonen B. Elsayed N. Ozer M. ElSayed Z. Deep Learning Algorithm for Threat Detection in Hackers Forum (Deep Web) 2023 ArXiv Accessed: Jul. 09 2023. [Online] Available:https://www.semanticscholar.org/paper/Deep-Learning-Algorithm-for-Threat-Detection-in-Adewopo-Gonen/61d9d838ce9da713a7aaf70bb17ab1e571d996cf.