experiences  with  DevSecOps.  Futurity 
Education,  2(4),  52–63. 
https://doi.org/10.57125/FED.2022.25.12.06 
Martelleur,  J.,  &  Hamza,  A.  (2022).  Security 
Tools in DevSecOps: A Systematic Literature 
Review.  [File  PDF]. 
http://urn.kb.se/resolve?urn=urn%3Anbn%3
Ase%3Alnu%3Adiva-118400 
Monika,  D.,  Singh,  S.,  &  Wason,  A.  (2023). 
Performance  investigations  on  data 
protection  algorithms  in  generalized  multi 
protocol  label  switched  optical  networks. 
Scientific  Reports,  13(1),  425. 
https://doi.org/10.1038/s41598-022-26942-0 
Montasari, R. (2023). Artificial Intelligence and 
the Internet of Things Forensics in a National 
Security  Context.  In  R.  Montasari  (Eds.), 
Countering Cyberterrorism: The Confluence 
of  Artificial  Intelligence,  Cyber  Forensics 
and Digital Policing in US and UK National 
Cybersecurity (pp. 57-80), Vol. 101. Cham: 
Springer  International  Publishing. 
https://doi.org/10.1007/978-3-031-21920-
7_4 
Mughaid,  A.,  AlZu’bi,  S.,  Alnajjar,  A., 
AbuElsoud,  E.,  Salhi,  S.  E.,  Igried,  B.,  & 
Abualigah,  L.  (2023).  Improved  dropping 
attacks detecting system in 5g networks using 
machine  learning  and  deep  learning 
approaches.  Multimedia  Tools  and 
Applications,  82(9),  13973-13995. 
https://doi.org/10.1007/s11042-022-13914-9 
National Institute of Standards and Technology 
(2023).  National  Vulnerability  Database 
(NVD)  Dashboard.  (2023). 
https://nvd.nist.gov/general/nvd-dashboard# 
Pawełoszek, I., Kumar, N., & Solanki, U. (2022). 
Artificial  intelligence,  digital  technologies 
and the future of law. Futurity Economics & 
Law,  2(2),  22–32. 
https://doi.org/10.57125/FEL.2022.06.25.03 
Pradhan, D., Sahu, P. K., Rajeswari, Tun, H. M., 
& Wah, N. K. S. (2023). Integration of AI/Ml 
in  5G  Technology  toward  Intelligent 
Connectivity, Security, and Challenges. In P. 
Chatterjee,  M.  Yazdani,  F.  Fernández-
Navarro,  &  J.  Pérez-Rodríguez  (Eds.), 
Machine  Learning  Algorithms  and 
Applications  in  Engineering.  CRC  Press. 
https://doi.org/10.1201/9781003104858-14 
Priyanka, K., Skandan, S., Shakthi Saravanan, S., 
Chandramohanan,  R.,  Darshan,  M.,  & 
Raswanth,  S.R.  (2023).  Unique  and  Secure 
Account  Management  System  Using  CNN 
and Blockchain Technology. In J. Singh, D. 
Das, L. Kumar, & A. Krishna (Eds.), Mobile 
Application  Development:  Practice  and 
Experience. Studies in Systems, Decision and 
Control (pp. 131-140), Vol. 452. Singapore: 
Springer.  https://doi.org/10.1007/978-981-
19-6893-8_11 
Sagu, A., Gill, N. S., Gulia, P., Singh, P. K., & 
Hong, W.-C. (2023). Design of Metaheuristic 
Optimization Algorithms for Deep Learning 
Model  for  Secure  IoT  Environment. 
Sustainability,  15(3),  2204. 
https://doi.org/10.3390/su15032204 
Saura,  J.  R.,  Ribeiro-Soriano,  D.,  &                         
Palacios-Marqués,  D.  (2022).  Evaluating 
security and privacy issues of social networks 
based  information  systems  in  Industry  4.0. 
Enterprise  Information  Systems,  16(10-11), 
1694-1710. 
https://doi.org/10.1080/17517575.2021.1913
765 
Seh, A. H., Yirgaw, H., Ahmad, M., Faizan, M., 
Pathak,  N.,  Zaman,  M.,  &  Agrawal,  A. 
(2023).  A  Cybersecurity  Perspective  of 
Machine  Learning  Algorithms.  In                                  
S.    A.  Khan,  R.  Kumar,  O. Kaiwartya,                         
R.  A.  Khan,  &  M.  Faisal  (Eds.), 
Computational  Intelligent  Security  in 
Wireless  Communications  (pp.  221-240). 
CRC  Press. 
https://doi.org/10.1201/9781003323426 
Shalini,  P.  (2023).  Multimodal  biometric 
decision fusion  security  technique  to evade 
immoral social networking sites for minors. 
Applied  Intelligence,  53(3),  2751-2776. 
https://doi.org/10.1007/s10489-022-03538-9 
Shalini,  S.,  Selvi,  M.,  Kannan,  A.,  &                     
Santhosh Kumar, S.V.N. (2023). Review of 
Security  Methods  Based  on  Classical 
Cryptography  and  Quantum  Cryptography. 
Cybernetics  and  Systems. 
https://doi.org/10.1080/01969722.2023.2166
261 
Sharma, D., Mittal, R., Sekhar, R., Shah, P., & 
Renz, M. (2023). A bibliometric analysis of 
cyber security and cyber forensics research. 
Results  in  Control  and  Optimization,  10, 
100204. 
https://doi.org/10.1016/j.rico.2023.100204 
Shiau,  W.  L.,  Wang,  X.,  &  Zheng,  F.  (2023). 
What  are  the  trend  and  core  knowledge  of 
information  security?  A  citation  and  co-
citation  analysis.  Information  & 
Management,  60(3),  103774. 
https://doi.org/10.1016/j.im.2023.103774 
Statista. (2023). Number of common IT security 
vulnerabilities  and  exposures  (CVEs) 
worldwide  from  2009  to  2023  YTD. 
https://www.statista.com/statistics/500755/w
orldwide-common-vulnerabilities-and-
exposures 
Upreti, K., Syed, M. H., Khan, M. A., Fatima, H., 
Alam,  M.  S.,  &  Sharma,  A.  K.  (2023). 
Enhanced  algorithmic  modelling  and