1. Barberio, M., Colella, M., Figliola, A., and Battisti, A. (2024). The Corona Decade: The Transition to the Age of Hyper-Connectivity and the Fourth Industrial Revolution. Architecture and Design for Industry 4.0: Theory and Practice, Springer International Publishing.
2. Cyber threats: Taxonomy, impact, policies, and way forward;Malik;KSII Trans. Internet Inf. Syst.,2022
3. Systematic literature review on intrusion detection systems: Research trends, algorithms, methods, datasets, and limitations;Issa;J. Intell. Syst.,2024
4. Pereira, F., Burges, C., Bottou, L., and Weinberger, K. (2012). ImageNet Classification with Deep Convolutional Neural Networks. Proceedings of the Advances in Neural Information Processing Systems, Curran Associates, Inc.
5. Gu, J., Zhu, M., Zhou, Z., Zhang, F., Lin, Z., Zhang, Q., and Breternitz, M. (2014, January 25–26). Implementation and evaluation of deep neural networks (DNN) on mainstream heterogeneous systems. the Proceedings of the 5th Asia-Pacific Workshop on Systems, APSys’14, Beijing, China.