https://ieeexplore.ieee.org/document/10646784/
https://link.springer.com/10.1007/s00500-021-06065-w
https://ieeexplore.ieee.org/document/9569735/
https://link.springer.com/10.1007/978-3-030-95312-6_1
http://link.springer.com/10.1007/978-981-15-8711-5_5
https://link.springer.com/10.1007/978-3-030-90456-2_3
https://www.worldscientific.com/doi/abs/10.1142/S0129054119400124
https://ieeexplore.ieee.org/document/9020635/
https://cybersecurity.springeropen.com/articles/10.1186/s42400-018-0005-8
https://ieeexplore.ieee.org/document/8406597/
https://doi.org/10.1016/j.jnca.2017.11.011
https://doi.org/10.1016/j.csi.2016.08.006
https://doi.org/10.1109/TIT.2016.2634553
http://link.springer.com/10.1007/978-3-319-65482-9_31
https://doi.org/10.1145/3046055.3046057
https://doi.org/10.1109/TDSC.2015.2423684
https://doi.org/10.1145/2996429.2996434
https://doi.org/10.1007/978-3-319-44618-9_6
http://ieeexplore.ieee.org/document/7636868/
http://ieeexplore.ieee.org/document/7636866/
http://ieeexplore.ieee.org/document/7820388/
http://ieeexplore.ieee.org/document/7546502/
http://link.springer.com/10.1007/s12083-014-0295-x
https://link.springer.com/10.1007/978-3-319-22846-4_17
https://doi.org/10.1145/2664243.2664287
http://ieeexplore.ieee.org/document/6963363/
https://doi.org/10.1109/IIH-MSP.2014.199
https://doi.org/10.1109/SPW.2014.44