Amiri, I.S., & Akanbi, O.A. (2015). A Machine-Learning Approach to Phishing Detection and Defense, Waltham, Elsevier, ISBN 9780128029466.
Google Scholar
Beaman C., Barkworth A., Akande T., Hakak S., & Khan M., (2021), Ransomware: Recent advances, analysis, challenges and future research directions, Computers & Security, 111, ISSN 0167-4048, DOI: 10.1016/j.cose.2021.102490.
Google Scholar
Bentkowski, M. (2021). Generowanie łatwych do zapamietania haseł z wykorzystaniem łańcuchów Markowa (Generating easy-to-remember passwords using Markov strings), retrieved from https://sekurak.pl/generowanie-latwych-do-zapamietania-hasel-z-wykorzystaniem-lancuchowmarkowa/ (accessed 15.08.2021).
Google Scholar
Formosa, P., Wilson, M., & Richards, D., (2021), A principlist framework for cybersecurity ethics, Computers & Security, 109, ISSN 0167-4048, DOI: 10.1016/j.cose.2021.102382.
Google Scholar
Giza M. (2021). Przegląd ataków na polskich internautów (6–19.09.2021 r.) [Overview of attacks on Polish internet users], Retrieved from https://sekurak.pl/przeglad-atakow-na-polskichinternautow-6-19-09-2021-r/ (accessed 21.09.2021).
Google Scholar
Information technology ‒ Security techniques ‒ Information security management systems ‒ Overview and vocabulary PN-EN ISO/IEC 27000:2018.
Google Scholar
Jakieła J., & Wójcik J., (2018). Przegląd problemów bezpieczeństwa informacji oraz prywatności w akademickim nauczaniu na odległość. [Review of information security and privacy issues in academic distance learning], Zeszyty Naukowe Uniwersytetu Ekonomicznego w Katowicach [In Polish], 355: 31-44, ISSN 2083-8611.
Google Scholar
Kaspersky Security Awareness (2021). Training programs to help you build a cybersafe organization. Retrived from https://www.kaspersky.com/enterprise-security/security-awareness (accessed 9.09.2021).
Google Scholar
Liderman, K. (2008). Analiza ryzyka i ochrona informacji w systemach komputerowych (Riskanalysis and information protection in computer systems), Warszawa, PWN, ISBN 9788301153700.
Google Scholar
Liderman, K. (2017). Bezpieczeństwo informacyjne (Information security), Warszawa, PWN, ISBN 9788301175009.
Google Scholar
McGahagan, J., Bhansali, D. Pinto-Coelho, C. & Cukier, M. (2021), Discovering features for detecting malicious websites: An empirical study, Computers & Security, 109, DOI: 10.1016/j.cose.2021.102374.
Google Scholar
Ponemon Institute Report (2020). Cost of a Data Breach Report 2020 IBM, Retrieved from https://www.ibm.com/security/data-breach (accessed17.09.2021).
Google Scholar
Ring, M., Schlör, D., Wunderlich, S., Landes, D. & Hotho, A. (2021). Malware detection on Windows Audit Logs using LSTMs. Computers & Security. 109. DOI: 102389. 10.1016/j.cose.2021.102389.
Google Scholar
Scerbakov, A., Scerbakov, N. & Kappe, F. (2019). Security Vulnerabilities in Modern LMS, DOI: 10.33965/el2019_201909C038.
Google Scholar
Skoudis, E., & Zeltser, L. (2004). Malware: Fighting Malicious Code, Pearson Education, Saddle River. ISBN 9780131014053
Google Scholar
The National Cyber Security Centre (2021). Reducing your exposure to cyber-attack, Retrieved from https://www.ncsc.gov.uk/ (accessed 17.09.2021).
Google Scholar
Verizon Report (2020). Data Breach Investigations Report 2020, Retrieved from https://www.verizon.com/business/resources/reports/dbir/ (accessed 9.09.2021)
Google Scholar
Wiener, G. (2019). Cyberterrorism and Ransomware Attacks, New York, Greenhaven Publishing. ISBN 9781534503403
Google Scholar
Woźniak-Zapór, M. (2016). Zarządzanie bezpieczeństwem informacji – metody przeciwdziałania zagrożeniom bezpieczeństwa informacji na platformie e-learningowej [Information security management ‒ methods of counter acting information security threats on the e-learning platform], Bezpieczeństwo. Teoria i praktyka [In Polish], 4: 87-97, ISSN2451-0718.
Google Scholar
Yuste, J. & Pastrana, S. (2021). Avaddon ransomware: an in-depth analysis and decryption of infected systems. Computers & Security, 109, DOI:10.1016/j.cose.2021.102388
Google Scholar