https://journals.sub.uni-hamburg.de/hup2/kommges/article/view/1413
https://linkinghub.elsevier.com/retrieve/pii/S2214212623002302
https://linkinghub.elsevier.com/retrieve/pii/S0305750X23000864
https://journals.iium.edu.my/kict/index.php/IJPCC/article/view/403
https://www.frontiersin.org/articles/10.3389/fcomm.2023.1140461/full
https://academic.oup.com/cybersecurity/article/doi/10.1093/cybsec/tyad014/7240368
https://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-6684-4964-6.ch011
https://academic.oup.com/comnet/article/doi/10.1093/comnet/cnac017/6647930
https://linkinghub.elsevier.com/retrieve/pii/S1751157720306386
https://www.tandfonline.com/doi/full/10.1080/19434472.2019.1651751
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-2466-4.ch039
https://appliednetsci.springeropen.com/articles/10.1007/s41109-019-0184-6
https://www.tandfonline.com/doi/full/10.1080/13216597.2018.1544162
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/IJCWT.2018070103
http://www.jbe-platform.com/content/journals/10.1075/jlp.17005.sie
https://www.tandfonline.com/doi/full/10.1080/01972243.2017.1391913
https://www.degruyter.com/document/doi/10.1515/icom-2017-0013/html