https://scholar.google.com/citations?user=C6X45tsAAAAJhttps://securelist.com/machine-learning-in-threat-hunting/https://securelist.com/new-tropic-trooper-web-shell-infection/https://securelist.com/bellacpp-cpp-version-of-bellaciao/https://securelist.com/dunequixote/https://securelist.com/cve-2024-30051/https://securelist.com/cloudsorcerer-new-apt-cloud-actor/https://www.kaspersky.com/blog/how-safe-is-wi-fi-in-paris/https://securelist.com/darknet-predictions-for-2024/https://securelist.com/ksb-dark-web-predictions-2025/https://securelist.com/hrserv-apt-web-shell/https://securelist.com/a-hack-in-hand-is-worth-two-in-the-bush/https://securelist.com/doublefinger-loader-delivering-greetingghoul-cryptocurrency-stealer/https://securelist.com/defttorero-tactics-techniques-and-procedures/https://securelist.com/deathstalker-targets-legal-entities-with-new-janicab-variant/https://securelist.com/ransomware-and-wiper-signed-with-stolen-certificates/https://securelist.com/a-bad-luck-blackcat/https://securelist.com/luna-black-basta-ransomware/https://securelist.com/elections-goransom-and-hermeticwiper-attack/https://securelist.com/wirtes-campaign-in-the-middle-east-living-off-the-land-since-at-least-2019/https://securelist.com/5g-predictions-2020/https://securelist.com/deathstalker-mercenary-triumvirate/https://securelist.com/5g-security-for-smart-cities/https://securelist.com/muddywaters-arsenal/https://securelist.com/gaza-cybergang-group1-operation-sneakypastes/https://bura.brunel.ac.uk/bitstream/2438/18085/1/FulltextThesis.pdf https://securelist.com/muddywater/https://securelist.com/operation-parliament-who-is-doing-what/https://www.emerald.com/insight/content/doi/10.1108/WJEMSD-07-2017-0042/full/html https://www.researchgate.net/publication/322961140_Securing_the_Smart_City_Olympics https://library.olympics.com/Default/doc/SYRACUSE/176013/securing-the-smart-city-olympics-mohamad-amin-hasbini-et-al https://securelist.com/from-shamoon-to-stonedrill/https://securelist.com/gaza-cybergang-updated-2017-activity/https://securingsmartcities.org/wp-content/uploads/2017/09/SSC-15-things-v1.3.pdf https://securingsmartcities.org/wp-content/uploads/2017/09/SSC-IAC.pdf https://securingsmartcities.org/wp-content/uploads/2017/09/SSC-SCCCM.pdf https://securingsmartcities.org/wp-content/uploads/2017/02/municipal_drones_FINAL.pdf https://securingsmartcities.org/wp-content/uploads/2016/03/Guidlines_for_Safe_Smart_Cities-1.pdf https://securelist.com/operation-ghoul-targeted-attacks-on-industrial-and-engineering-organizations/https://www.researchgate.net/publication/320290792_The_Smart_City_Department_Cyber_Security_role_and_implications_Authors https://securelist.com/the-syrian-malware-part-2-who-is-the-joe/https://securelist.com/the-desert-falcons-targeted-attacks/https://securelist.com/gaza-cybergang-wheres-your-ir-team/https://securelist.com/the-rise-of-cybercrime-in-dubai-and-uae/https://securelist.com/the-syrian-malware-house-of-cards/