https://www.frontiersin.org/articles/10.3389/fdata.2023.1296469/full
https://cybersecurity.springeropen.com/articles/10.1186/s42400-020-00057-3
https://jis-eurasipjournals.springeropen.com/articles/10.1186/s13635-019-0091-5
https://www.frontiersin.org/article/10.3389/fdata.2019.00001/full