1. Sadhu, P.K., Yanambaka, V.P., and Abdelgawad, A. (2022). Internet of Things: Security and Solutions Survey. Sensors, 22.
2. Chakraborty, C., Lin, J.C.W., and Alazab, M. (2021). Cybercrime Issues in Smart Cities Networks and Prevention Using Ethical Hacking. Data-Driven Mining, Learning and Analytics for Secured Smart Cities: Trends and Advances, Springer International Publishing.
3. Applebaum, A., Miller, D., Strom, B., Foster, H., and Thomas, C. (2017, January 16–19). Analysis of Automated Adversary Emulation Techniques. Proceedings of the Summer Simulation Multi-Conference, San Diego, CA, USA. SummerSim ’17.
4. Miller, D., Alford, R., Applebaum, A., Foster, H., Little, C., and Strom, B.E. (2018). Automated Adversary Emulation: A Case for Planning and Acting with Unknowns, The MITRE Corporation.
5. Ammann, P., Wijesekera, D., and Kaushik, S. (2002, January 18–22). Scalable, graph-based network vulnerability analysis. Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS ’02), Washington, DC, USA.