References List (Non-curated and reviewed)

This is where I will store a non-exhaustive list of references I am reviewing for my thesis project:

Aftergood, S. (2017). Cybersecurity: The cold war online. Nature, 547(7661), 30–31. https://doi.org/10.1038/547030a

Australian Cyber Security Centre. (2022). Annual Cyber Threat Report. https://www.cyber.gov.au/sites/default/files/2022-11/ACSC-Annual-Cyber-Threat-Report-2022.pdf

Craigen, D., Diakun-Thibault, N., & Purse, R. (2014). Defining Cybersecurity. Technology Innovation Management Review, 4(10). https://www.timreview.ca/article/835

Dasgupta, D., Akhtar, Z., & Sen, S. (2020). Machine learning in cybersecurity: a comprehensive survey. The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology, 19(1), 154851292095127. https://doi.org/10.1177/1548512920951275

Franco, M. F., Rodrigues, B., Scheid, E. J., Jacobs, A., Killer, C., Granville, L. Z., & Stiller, B. (2020, November 1). SecBot: a Business-Driven Conversational Agent for Cybersecurity Planning and Management. IEEE Xplore. https://doi.org/10.23919/CNSM50824.2020.9269037

Georgescu, T.-M. (2020). Natural Language Processing Model for Automatic Analysis of Cybersecurity-Related Documents. Symmetry, 12(3), 354. https://doi.org/10.3390/sym12030354

Holt, T. J., & Bossler, A. M. (2020). The Palgrave handbook of international cybercrime and cyberdeviance. Palgrave Macmillan, Springer Nature Switzerland.

Jones, C. L., Bridges, R. A., Huffer, K. M. T., & Goodall, J. R. (2015). Towards a Relation Extraction Framework for Cyber-Security Concepts. Proceedings of the 10th Annual Cyber and Information Security Research Conference on – CISR ’15. https://doi.org/10.1145/2746266.2746277

Khan, W., Daud, A., Nasir, J. A., & Amjad, T. (2016). A survey on the state-of-the-art machine learning models in the context of NLP. Kuwait Journal of Science, 43(4).