https://linkinghub.elsevier.com/retrieve/pii/S0167404824003341
https://cybersecurity.springeropen.com/articles/10.1186/s42400-022-00121-0
https://linkinghub.elsevier.com/retrieve/pii/S1877050921020305
https://linkinghub.elsevier.com/retrieve/pii/S1877050920319487