@misc{cooke_2014_ibisworld,
  author = {Cooke, Jayson},
  title = {IBISWorld - Industry Market Research, Reports, and Statistics},
  url = {https://www.ibisworld.com/au/industry/cybersecurity-software-services/14771/},
  year = {2014},
  organization = {IBISWorld}
}

@article{bernstein_2017_postquantum,
  author = {Bernstein, Daniel J. and Heninger, Nadia and Lou, Paul and Valenta, Luke},
  pages = {311-329},
  title = {Post-quantum RSA},
  doi = {10.1007/978-3-319-59879-6_18},
  volume = {10346},
  year = {2017},
  journal = {Post-Quantum Cryptography}
}

@article{rivest_1978_a,
  author = {Rivest, R. L. and Shamir, A. and Adleman, L.},
  pages = {120-126},
  title = {A method for obtaining digital signatures and public-key cryptosystems},
  doi = {10.1145/359340.359342},
  url = {http://people.csail.mit.edu/rivest/Rsapaper.pdf},
  volume = {21},
  year = {1978},
  journal = {Communications of the ACM}
}

@article{dada_2019_machine,
  author = {Dada, Emmanuel Gbenga and Bassi, Joseph Stephen and Chiroma, Haruna and Abdulhamid, Shafi'i Muhammad and Adetunmbi, Adebayo Olusola and Ajibuwa, Opeyemi Emmanuel},
  month = {06},
  pages = {e01802},
  title = {Machine learning for email spam filtering: review, approaches and open research problems},
  doi = {10.1016/j.heliyon.2019.e01802},
  url = {https://www.sciencedirect.com/science/article/pii/S2405844018353404},
  volume = {5},
  year = {2019},
  journal = {Heliyon}
}

@book{daswani_2021_big,
  author = {Daswani, Neil and Elbayadi, Moudy},
  publisher = {Apress},
  title = {Big breaches : cybersecurity lessons for everyone},
  year = {2021}
}

@article{bezuglova_2023_an,
  author = {Bezuglova, Ekaterina and Kucherov, Nikolay},
  pages = {300-311},
  publisher = {Springer Nature Switzerland},
  title = {An Overview of Modern Fully Homomorphic Encryption Schemes},
  doi = {10.1007/978-3-031-34127-4_29},
  urldate = {2024-09-27},
  volume = {702},
  year = {2023},
  journal = {Lecture Notes in Networks and Systems}
}

@article{shor_1994_algorithms,
  author = {Shor, P.W.},
  title = {Algorithms for quantum computation: discrete logarithms and factoring},
  doi = {10.1109/sfcs.1994.365700},
  url = {https://dl.acm.org/citation.cfm?id=1399018},
  year = {1994},
  journal = {Proceedings 35th Annual Symposium on Foundations of Computer Science}
}

@article{deshpande_2007_an,
  author = {Deshpande, Vikas P. and Erbacher, Robert F. and Harris, Chris},
  pages = {333-340},
  title = {An Evaluation of Naïve Bayesian Anti-Spam Filtering Techniques},
  doi = {10.1109/IAW.2007.381951},
  year = {2007},
  journal = {2007 IEEE SMC Information Assurance and Security Workshop}
}

@misc{elmrabit_2020_evaluation,
  author = {Elmrabit, N. and Zhou, F. and Li, F. and Zhou, H.},
  pages = {1–8},
  title = {Evaluation of Machine Learning Algorithms for Anomaly Detection},
  doi = {10.1109/CyberSecurity49315.2020.9138871},
  url = {https://ieeexplore.ieee.org/document/9138871},
  year = {2020},
  organization = {IEEE Xplore}
}

@misc{khalid_2019_latticebased,
  author = {Khalid, Ayesha and McCarthy, Sarah and O’Neill, Maire and Liu, Weiqiang},
  month = {06},
  pages = {194–199},
  title = {Lattice-based Cryptography for IoT in A Quantum World: Are We Ready?},
  doi = {10.1109/IWASI.2019.8791343},
  url = {https://ieeexplore.ieee.org/abstract/document/8791343/},
  urldate = {2021-11-13},
  year = {2019},
  organization = {IEEE Xplore}
}

@article{gong_2024_practical,
  author = {Gong, Yanwei and Chang, Xiaolin and Jelena Mišić and Mišić, Vojislav B and Wang, Jianhua and Zhu, Haoran},
  month = {03},
  publisher = {Springer Nature},
  title = {Practical solutions in fully homomorphic encryption: a survey analyzing existing acceleration methods},
  doi = {10.1186/s42400-023-00187-4},
  urldate = {2024-03-18},
  volume = {7},
  year = {2024},
  journal = {Cybersecurity}
}

@article{rachmawati_2018_a,
  author = {Rachmawati, D and Tarigan, J T and Ginting, A B C},
  month = {03},
  pages = {012116},
  title = {A comparative study of Message Digest 5(MD5) and SHA256 algorithm},
  doi = {10.1088/1742-6596/978/1/012116},
  volume = {978},
  year = {2018},
  journal = {Journal of Physics: Conference Series}
}

@article{marchal_2014_phishscore,
  author = {Marchal, Samuel and Francois, Jerome and State, Radu and Engel, Thomas},
  month = {11},
  publisher = {Le Centre pour la Communication Scientifique Directe},
  title = {PhishScore: Hacking phishers' minds},
  doi = {10.1109/cnsm.2014.7014140},
  urldate = {2023-04-28},
  year = {2014},
  journal = {HAL (Le Centre pour la Communication Scientifique Directe)}
}

@article{zhang_2022_explainable,
  author = {Zhang, Zhibo and Hamadi, Hussam Al and Damiani, Ernesto and Yeun, Chan Yeob and Taher, Fatma},
  pages = {93104-93139},
  title = {Explainable Artificial Intelligence Applications in Cyber Security: State-of-the-Art in Research},
  doi = {10.1109/access.2022.3204051},
  volume = {10},
  year = {2022},
  journal = {IEEE Access}
}

@article{black_2006_a,
  author = {Black, John and Cochran, Martin and Highland, Trevor},
  month = {01},
  pages = {262-277},
  title = {A Study of the MD5 Attacks: Insights and Improvements},
  doi = {10.1007/11799313_17},
  volume = {4047},
  year = {2006},
  journal = {Fast Software Encryption. FSE 2006. Lecture Notes in Computer Science}
}

@article{wang_2005_cryptanalysis,
  author = {Wang, Xiaoyun and Lai, Xuejia and Feng, Dengguo and Chen, Hui and Yu, Xiuyuan},
  pages = {1-18},
  title = {Cryptanalysis of the Hash Functions MD4 and RIPEMD},
  doi = {10.1007/11426639_1},
  volume = {3494},
  year = {2005},
  journal = {Lecture Notes in Computer Science}
}

@article{nadeem_2023_phishing,
  author = {Nadeem, Muhammad and Zahra, Syeda W. and Abbasi,  Muhammad N. and Arshad, Ali},
  month = {09},
  pages = {18-25},
  title = {Phishing Attack, Its Detections and Prevention Techniques},
  doi = {10.37591/IJWSN},
  volume = {12},
  year = {2023},
  journal = {International Journal of Wireless Information Networks}
}

@article{sommer_2010_outside,
  author = {Sommer, Robin and Paxson, Vern},
  title = {Outside the Closed World: On Using Machine Learning for Network Intrusion Detection},
  doi = {10.1109/sp.2010.25},
  url = {https://ieeexplore.ieee.org/abstract/document/5504793/},
  year = {2010},
  journal = {2010 IEEE Symposium on Security and Privacy}
}

@article{chandola_2009_anomaly,
  author = {Chandola, Varun and Banerjee, Arindam and Kumar, Vipin},
  month = {07},
  pages = {1-58},
  title = {Anomaly Detection: A Survey},
  doi = {10.1145/1541880.1541882},
  volume = {41},
  year = {2009},
  journal = {ACM Computing Surveys}
}

@article{buczak_2016_a,
  author = {Buczak, Anna L. and Guven, Erhan},
  pages = {1153-1176},
  title = {A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection},
  doi = {10.1109/comst.2015.2494502},
  volume = {18},
  year = {2016},
  journal = {IEEE Communications Surveys & Tutorials}
}

@article{guo_2021_a,
  author = {Guo, Sensen and Zhao, Jinxiong and Li, Xiaoyu and Duan, Junhong and Mu, Dejun and Jing, Xiao},
  editor = {Yang, Qing},
  month = {04},
  pages = {1-13},
  title = {A Black-Box Attack Method against Machine-Learning-Based Anomaly Network Flow Detection Models},
  doi = {10.1155/2021/5578335},
  urldate = {2022-01-05},
  volume = {2021},
  year = {2021},
  journal = {Security and Communication Networks}
}

@article{hu_2017_on,
  author = {Hu, Weiwei and Tan, Ying},
  month = {05},
  pages = {1435–1441},
  title = {On the robustness of machine learning based malware detection algorithms},
  doi = {10.1109/ijcnn.2017.7966021},
  urldate = {2024-01-13},
  year = {2017},
  journal = {Proceedings of the IEEE 2017 International Joint Conference on Neural Networks (IJCNN)}
}

@article{pascalpaillier_1999_efficient,
  author = {Pascal Paillier and Pointcheval, David},
  month = {01},
  pages = {165-179},
  title = {Efficient Public-Key Cryptosystems Provably Secure Against Active Adversaries},
  doi = {10.1007/978-3-540-48000-6_14},
  urldate = {2023-07-21},
  year = {1999},
  journal = {}
}

@article{toledano_2018_realtime,
  author = {Toledano, Meir and Cohen, Ira and Yonatan Ben-Simhon and Inbal Tadeski},
  month = {01},
  pages = {56-65},
  title = {Real-time anomaly detection system for time series at scale},
  urldate = {2024-09-27},
  year = {2018},
  journal = {Knowledge Discovery and Data Mining}
}