[
[1] R. Sobers: 110 Must-Know Cybersecurity Statistics for 2020, Inside Out Security Blog, 2020, Available at: https://www.varonis.com/blog/cybersecurity-statistics/
]Search in Google Scholar
[
[2] S. Baraković, et al.: Security Issues in Wireless Networks: An Overview, Proceedings of the 11th International Symposium on Telecommunications, (BIHTEL 2016), Sarajevo, Bosnia and Herzegovina, 201610.1109/BIHTEL.2016.7775732
]Search in Google Scholar
[
[3] C. Crane: The Top Cyber Security Trends in 2019 (and What to Expect in 2020), 2019, Available at: https://www.thesslstore.com/blog/the-top-cyber-security-trends-in-2019-and-what-to-expect-in-2020/
]Search in Google Scholar
[
[4] Verzion: Data Breach Investigations Report, 201910.1016/S1361-3723(19)30060-0
]Search in Google Scholar
[
[5] RSA: 2019 Current State of Cybercrime - The Digital Transformation of Cybercrime, 2019, Available at: https://www.rsa.com/content/dam/en/white-paper/2019-current-state-of-cybercrime.pdf
]Search in Google Scholar
[
[6] Malwarebytes LABS: Cybercrime tactics and techniques Q1 2019, 2019, Available at: https://resources.malwarebytes.com/files/2019/04/MWB-CTNT-2019-state-of-malware_FINAL.pdf10.1016/S1361-3723(19)30049-1
]Search in Google Scholar
[
[7] Ponemon Institute: Staffing the IT Security Function in the Age of Automation: A Study of Organizations in the United States, United Kingdom and APAC, 2019, Available at: https://www.domaintools.com/content/2019-ponemon-report-staffing-it-age-automation.pdf
]Search in Google Scholar
[
[8] IDC: Worldwide Spending on Security Solutions Forecast to Reach $103.1 Billion in 2019, According to a New IDC Spending Guide, 2019, Available at: https://www.idc.com/getdoc.jsp?container-Id=prUS44935119
]Search in Google Scholar
[
[9] NetAcad: CCNA Security, 2019
]Search in Google Scholar
[
[10] S. Baraković, J. Baraković Husić: Short and Sweet: Cloud Computing and Its Security, Proceedings of the 11th International Symposium on Telecommunications, (BIHTEL 2016), Sarajevo, Bosnia and Herzegovina, 201610.1109/BIHTEL.2016.7775725
]Search in Google Scholar
[
[11] OWASP: Top 10 Web Application Security Risks, 2019, Available at: https://owasp.org/www-project-top-ten/
]Search in Google Scholar
[
[12] K. D. Mitnick, W. L. Simon. The Art of Deception: Controlling the Human Element of Security. Wiley, 1st edition, 2003
]Search in Google Scholar
[
[13] M. Curphey, J. Scambray, E. Olson: Improving Web Application Security, Threats and Countermeasures, 2003
]Search in Google Scholar
[
[14] N. Shevchenko, T. A. Chick, P. O’Riordan, T. Scan-lon, C. Woody: Threat modeling: A summary of available methods, 2018, Available: https://resources.sei.cmu.edu/library/asset-view.cfm?assetid=524448
]Search in Google Scholar
[
[15] A. Shostack: Threat Modeling: Designing for Security. John Wiley & Sons, Inc., 2014
]Search in Google Scholar
[
[16] M. Haider: Application Threat Modelling using DREAD and STRIDE, Infosec Blog, 2017, Available at: https://haiderm.com/application-threat-modeling-using-dread-and-stride/
]Search in Google Scholar
[
[17] R. Shahan: Azure Internet of Things: Internet of Things (IoT) security architecture, Microsoft Azure, 2018, Available at: https://docs.microsoft.com/enus/azure/iot-fundamentals/iot-security-architecture.
]Search in Google Scholar
[
[18] M. Kovatsch, R. Matsukura, M. Lagally, T. Kawaguchi, K. Toumura, K. Kajimoto: WoT architecture, W3C, 2020, Available at: https://www.w3.org/TR/wot-architecture/
]Search in Google Scholar
[
[19] Microsoft Corporation: Threat Modeling: Microsoft Threat Modeling Tool, 2020, Available at: https://www.microsoft.com/en-us/securityengineering/sdl/threatmodeling
]Search in Google Scholar