experiences with DevSecOps. Futurity
Education, 2(4), 52–63.
https://doi.org/10.57125/FED.2022.25.12.06
Martelleur, J., & Hamza, A. (2022). Security
Tools in DevSecOps: A Systematic Literature
Review. [File PDF].
http://urn.kb.se/resolve?urn=urn%3Anbn%3
Ase%3Alnu%3Adiva-118400
Monika, D., Singh, S., & Wason, A. (2023).
Performance investigations on data
protection algorithms in generalized multi
protocol label switched optical networks.
Scientific Reports, 13(1), 425.
https://doi.org/10.1038/s41598-022-26942-0
Montasari, R. (2023). Artificial Intelligence and
the Internet of Things Forensics in a National
Security Context. In R. Montasari (Eds.),
Countering Cyberterrorism: The Confluence
of Artificial Intelligence, Cyber Forensics
and Digital Policing in US and UK National
Cybersecurity (pp. 57-80), Vol. 101. Cham:
Springer International Publishing.
https://doi.org/10.1007/978-3-031-21920-
7_4
Mughaid, A., AlZu’bi, S., Alnajjar, A.,
AbuElsoud, E., Salhi, S. E., Igried, B., &
Abualigah, L. (2023). Improved dropping
attacks detecting system in 5g networks using
machine learning and deep learning
approaches. Multimedia Tools and
Applications, 82(9), 13973-13995.
https://doi.org/10.1007/s11042-022-13914-9
National Institute of Standards and Technology
(2023). National Vulnerability Database
(NVD) Dashboard. (2023).
https://nvd.nist.gov/general/nvd-dashboard#
Pawełoszek, I., Kumar, N., & Solanki, U. (2022).
Artificial intelligence, digital technologies
and the future of law. Futurity Economics &
Law, 2(2), 22–32.
https://doi.org/10.57125/FEL.2022.06.25.03
Pradhan, D., Sahu, P. K., Rajeswari, Tun, H. M.,
& Wah, N. K. S. (2023). Integration of AI/Ml
in 5G Technology toward Intelligent
Connectivity, Security, and Challenges. In P.
Chatterjee, M. Yazdani, F. Fernández-
Navarro, & J. Pérez-Rodríguez (Eds.),
Machine Learning Algorithms and
Applications in Engineering. CRC Press.
https://doi.org/10.1201/9781003104858-14
Priyanka, K., Skandan, S., Shakthi Saravanan, S.,
Chandramohanan, R., Darshan, M., &
Raswanth, S.R. (2023). Unique and Secure
Account Management System Using CNN
and Blockchain Technology. In J. Singh, D.
Das, L. Kumar, & A. Krishna (Eds.), Mobile
Application Development: Practice and
Experience. Studies in Systems, Decision and
Control (pp. 131-140), Vol. 452. Singapore:
Springer. https://doi.org/10.1007/978-981-
19-6893-8_11
Sagu, A., Gill, N. S., Gulia, P., Singh, P. K., &
Hong, W.-C. (2023). Design of Metaheuristic
Optimization Algorithms for Deep Learning
Model for Secure IoT Environment.
Sustainability, 15(3), 2204.
https://doi.org/10.3390/su15032204
Saura, J. R., Ribeiro-Soriano, D., &
Palacios-Marqués, D. (2022). Evaluating
security and privacy issues of social networks
based information systems in Industry 4.0.
Enterprise Information Systems, 16(10-11),
1694-1710.
https://doi.org/10.1080/17517575.2021.1913
765
Seh, A. H., Yirgaw, H., Ahmad, M., Faizan, M.,
Pathak, N., Zaman, M., & Agrawal, A.
(2023). A Cybersecurity Perspective of
Machine Learning Algorithms. In
S. A. Khan, R. Kumar, O. Kaiwartya,
R. A. Khan, & M. Faisal (Eds.),
Computational Intelligent Security in
Wireless Communications (pp. 221-240).
CRC Press.
https://doi.org/10.1201/9781003323426
Shalini, P. (2023). Multimodal biometric
decision fusion security technique to evade
immoral social networking sites for minors.
Applied Intelligence, 53(3), 2751-2776.
https://doi.org/10.1007/s10489-022-03538-9
Shalini, S., Selvi, M., Kannan, A., &
Santhosh Kumar, S.V.N. (2023). Review of
Security Methods Based on Classical
Cryptography and Quantum Cryptography.
Cybernetics and Systems.
https://doi.org/10.1080/01969722.2023.2166
261
Sharma, D., Mittal, R., Sekhar, R., Shah, P., &
Renz, M. (2023). A bibliometric analysis of
cyber security and cyber forensics research.
Results in Control and Optimization, 10,
100204.
https://doi.org/10.1016/j.rico.2023.100204
Shiau, W. L., Wang, X., & Zheng, F. (2023).
What are the trend and core knowledge of
information security? A citation and co-
citation analysis. Information &
Management, 60(3), 103774.
https://doi.org/10.1016/j.im.2023.103774
Statista. (2023). Number of common IT security
vulnerabilities and exposures (CVEs)
worldwide from 2009 to 2023 YTD.
https://www.statista.com/statistics/500755/w
orldwide-common-vulnerabilities-and-
exposures
Upreti, K., Syed, M. H., Khan, M. A., Fatima, H.,
Alam, M. S., & Sharma, A. K. (2023).
Enhanced algorithmic modelling and