<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>IS-EUD</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Artificial Intelligence for Cyber Security Education in Software Engineering</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Maria Teresa Baldassarre</string-name>
          <email>teresa.baldassarre@uniba.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Mirko De Vincentiis</string-name>
          <email>mirko.devincentiis@uniba.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Anibrata Pal</string-name>
          <email>anibrata.pal@uniba.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Michele Scalera</string-name>
          <email>michele.scalera@uniba.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="editor">
          <string-name>Cyber Security Education, Industry Education, Quantum Artificial Intelligence,</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>University of Bari Aldo Moro, Department of Computer Science</institution>
          ,
          <addr-line>Via Edoardo Orabona 4, Bari</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2023</year>
      </pub-date>
      <volume>9</volume>
      <fpage>6</fpage>
      <lpage>8</lpage>
      <abstract>
        <p>The impact of Cyber Security is global, requiring immediate attention for protecting, conserving, and maintaining the integrity of any data. The need for cyber security is of utmost importance in Industry or Academics. To address this, all stakeholders should have substantial knowledge about cyber security and how to implement it. The use of published generic standards and guidelines does not describe the technologies or solutions that can be used. Currently, machine learning-based applications, serious games, or remote training can be used to bridge this gap. This paper proposes a vision model based on Quantum Artificial Intelligence (QAI) that generates secure software development (SSD) rules to educate and train developers and testers during diferent phases of the Software Development Life Cycle (SDLC). The proposed model trains QAI algorithms on data from industry standards, vulnerability information, and proprietary and historical data to create security rules that developers and testers can quickly adapt. Consequently, a case study about the automotive industry SSD discusses the application of the vision model.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        The ever-growing capabilities of modern computers have empowered researchers to achieve
astounding feats. The problem of Cyber Security (CS) also has become more sophisticated and,
therefore, should be managed with more caution and urgency [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. The protection of personal
as well as public data and its integrity is indispensable for any software solution [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
      <p>
        Due to advanced research, Artificial Intelligence (AI) techniques are used in a wide range of
CS applications [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. For example, in the automotive field, AI is used to detect attacks that exploit
vulnerabilities of standard in-vehicle network protocols [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. To create robust components
that prevent attacks, automotive standards require the introduction of cybersecurity in their
development strategies [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. Machine Learning (ML) approaches have been extensively used to
develop Intrusion Detection Systems for many devices [
        <xref ref-type="bibr" rid="ref6 ref7">6, 7</xref>
        ].
      </p>
      <p>
        Emerging technologies have forayed into Quantum Computing (QC) as a viable and faster
alternative to ML, and it has been proven to solve complex problems in a reasonable amount of
time [
        <xref ref-type="bibr" rid="ref8 ref9">8, 9</xref>
        ]. However, commercial and broader usage of Quantum Technologies is still under
consideration because of the inherent instability of quantum computers.
      </p>
      <p>Developing secure software is extremely challenging, even though there are diferent
standards for secure software development, as it requires advanced skills, knowledge, and
considerable time. Developers and testers in the industry cannot gain such skills overnight and, thus,
need a framework and strategic training to support development and decision-making during
the Software Development Life Cycle (SDLC).</p>
      <p>This paper presents a vision model involving Quantum Artificial Intelligence (QAI) to
propose a CS education and training framework for Developers and Testers, and empower the
resources to make better and informed decisions during the SDLC. The model can be tailored
and implemented across industries or academia. We present the related works in Section 2 and
the vision model in Section 3, followed by the conclusion in Section 4, stating the potential
principal gains from using the model.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Related Work</title>
      <p>
        Implementing cyber security in diverse systems requires high skills in CS, coding eforts, and
time, which calls for directed CS education and training of resources [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. The European Union
(EU) stresses the member states to increase their cybersecurity capacity by propagating CS
education in their academic curriculum [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. Also, the lack of cybersecurity skills in the
European labour force should be addressed seriously by addressing and reshaping the latest
educational content [11].
      </p>
      <p>Alahmari et al.[12] proposed that CS Education and training can be imparted through serious
games to deliver security training based on the Transactive Memory System Theory (TMS).
Tioh et al. [13] also justified using serious games for CS training as it combines the benefits
of both traditional and hands-on training. As per Dominguez et al. [14], remote CS training
is also a viable option in the industry using cabinets with elements for automation, control,
administration, and communication elements. Furthermore, industrial CS training activities
can also be carried out using augmented reality-based tools as per Skorenkyy et al. [15].</p>
      <p>In a diferent study [ 16], to attend to the expanding need for security specialists, the authors
suggested a wide variety of education and training curricula based on the Cyber Security Body
of Knowledge (CyBOK). Pirta-Dreiman et al. [17] adopted the Intervention Mapping paradigm
to propose a cyber security educational framework incorporating validated theoretical and
evidence-based approaches. Rajamäki et al. [18] proposed a framework for the education and
training of healthcare workers based on the principle of interactivity, guidance, and relevancy
to users’ operational environment.</p>
      <p>Cyber Security also applies to the automotive sector, where modern vehicles use the latest
technologies, making them prone to remote CS attacks[19, 20]. CS education in the automotive
industry renders standards like ISO/SAE 21434 [21] and Automotive SPICE (ASPICE)
mandatory. Moreover, there are taxonomies to analyze and classify automotive attacks to support
the development process [22]. Rahmani et al. [23] proposed a Quantum Secure Multiparty
Computation (QSMC) that uses quantum features to allow secure communication between
vehicles, preserving their confidential data privacy.</p>
      <p>To date, several QAI algorithms have been published that could be used in a wide range of
industries, including but not limited to transport, healthcare, pharmaceutical, etc. For instance,
Quantum ML was successfully implemented to detect cyber attacks on vehicles [24]. Most
QML algorithms adapt traditional ML algorithms to implement their quantum counterparts
[25, 26, 27].</p>
      <p>For these reasons, QML could emerge as a future key element of the cyber security training
process in software engineering and also improve the developer’s and organizations’ education
in SDLC.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Methodology</title>
      <p>We present a vision model that we call Industrial Cyber Security Education with Quantum
Artificial Intelligence (ICSEQAI), a high-level abstraction of a learning framework to support
developers and testers during the SDLC (Figure:1).</p>
      <p>As per the ICSEQAI (Figure:1) vision model, artefacts including but not limited to Company
Proprietary Security Guidelines, Industry Security Standards, previously analyzed solutions or
reports, and vulnerable component data can be processed and repurposed to support
decisionmaking by the developers and testers during the SDLC. These artefacts can be translated into
specific rules necessary for secure software development [ 28]. The rules can be mapped using
industry standards, for example, automotive industry standards or global application standards
like OWASP Application Security Verification Standard 1 to generate a robust model for
decisionmaking. Quantum Artificial Intelligence (QAI) can be trained for such a constrained model
to provide an optimal solution, which can be used to update existing security guidelines or
standards and educate the developers and testers regarding CS during SDLC.</p>
      <p>To understand the model, we present, as a case study, a secure software development process
to fix a vulnerable automobile component. The Industry Standard for Road vehicles —
Cybersecurity engineering, ISO/SAE 21434:2021 [29], a high-level guideline for security solutions in the
automotive domain, does not provide concrete design ideas, making assimilation into SDLC
1https://owasp.org/www-project-application-security-verification-standard/
dificult. Therefore, the guide can be split into multiple rules for SDLC support. Vulnerable
Electronic Control Units (ECU), building blocks of a car’s internal network, can provide
invaluable information about specific attacks and details about the vulnerabilities. Historical security
analyses, solutions, and fixes for previous ECU attacks and vulnerabilities are equally important
as they contain precious information about specific drawbacks and implemented fixes.</p>
      <p>A constrained optimization problem can be formulated from the dataset of similar rules,
standards, data, and constraints based on ISO/SAE 21434:2021, OWASP, and SDLC, which can
be trained on QAI algorithms to perform Rule Optimization (RO in Figure:1), generating optimal
secure development rules for vulnerability fixes. For example, ICSQAI would suggest the best 
strategies among  diferent actions suited to a specific developmental phase, where  is the
constraint (rules to fix vulnerability). These rules can be translated to update company security
guidelines, propose updated standards, and educate and train Developers and Testers to adjust
to newer security requirements and standards during SDLC.</p>
      <p>The proposed ICSQAI model can be eficiently used to continuously train and educate the
company resources, like architects, developers, and testers, on CS skills. The model can educate
the developers by displaying automated messages providing details about secure coding rules
applicable to a specific module during coding/unit testing. Whereas the testers would receive
onscreen comprehensive testing guidance for newly incorporated fixes.</p>
      <p>Finally, diferent QAI algorithms can be trained in diferent contexts to achieve the proposed
goal. Quantum classification algorithms can be used to help the system in the classification of
vulnerable components, whereas the optimization algorithms like constrained quadratic models
(CQM) or discrete quadratic models (DQM) can generate the rules for training and education.
Concurrently, reinforcement learning using variational quantum circuits can also help adapting
new development guidelines to update the existing ones [30].</p>
    </sec>
    <sec id="sec-4">
      <title>4. Conclusion</title>
      <p>The likelihood of cyber-attacks is amplified by the magnitude and intricacy of the SDLC.
However, only broad standards are available, and their implementation is challenging due to
the dearth of necessary expertise and knowledge. Nevertheless, this gap could be overcome by
adopting new solutions based on Quantum Artificial Intelligence algorithms and processes that
could support Cyber Security Education in the industry. A vision model, ICSEQAI, was presented
in this paper, where industry rules, standards, and information about existing vulnerable
software components can be formulated as optimization problems and trained on QAI models
to support the development and testing phase in the organization. To support our claim, we
presented a brief case study showing the impact of the proposed learning framework in cyber
security education in the automotive industry. The development of serious games can be an
interesting future approach to address the issue of cyber security education in industry and
academics.</p>
    </sec>
    <sec id="sec-5">
      <title>Acknowledgments</title>
      <p>This study has been partially supported by the following projects: SSA (Secure Safe Apulia –
Regional Security Center, Codice Progetto 6ESURE5) and KEIRETSU (Codice Progetto V9UFIL5)
funded by ”Regolamento regionale della Puglia per gli aiuti in esenzione n. 17 del 30/09/2014
(BURP n. 139 suppl. del 06/10/2014) TITOLO II CAPO 1 DEL REGOLAMENTO GENERALE
”Avviso per la presentazione dei progetti promossi da Grandi Imprese ai sensi dell’articolo 17 del
Regolamento”; and SERICS (Security and Rights In the CyberSpace - PE00000014) under the MUR
National Recovery and Resilience Plan funded by the European Union - NextGenerationEU.
Member States: December 2022., Publications Ofice, 2023. URL: https://data.europa.eu/
doi/10.2824/486119.
[11] B. J. Blažič, Changing the landscape of cybersecurity education in the EU: Will the new
approach produce the required cybersecurity skills?, Education and Information
Technologies 27 (2022) 3011–3036. URL: https://link.springer.com/10.1007/s10639-021-10704-y.
doi:10.1007/s10639-021-10704-y.
[12] S. Alahmari, K. Renaud, I. Omoronyia, Moving beyond cyber security awareness and
training to engendering security knowledge sharing, Information Systems and e-Business
Management 21 (2023) 123–158. URL: https://link.springer.com/10.1007/s10257-022-00575-2.
doi:10.1007/s10257-022-00575-2.
[13] J.-N. Tioh, M. Mina, D. W. Jacobson, Cyber security training a survey of serious games
in cyber security, in: 2017 IEEE Frontiers in Education Conference (FIE), 2017, pp. 1–5.
doi:10.1109/FIE.2017.8190712.
[14] M. Domínguez, D. Pérez, A. Morán, S. Alonso, M. A. Prada, J. J. Fuertes, Remote training in
cybersecurity for industrial control systems, IFAC-PapersOnLine 55 (2022) 320–325. URL:
https://linkinghub.elsevier.com/retrieve/pii/S2405896322015427. doi:10.1016/j.ifacol.
2022.09.299.
[15] Y. Skorenkyy, R. Kozak, N. Zagorodna, O. Kramar, I. Baran, Use of augmented
realityenabled prototyping of cyber-physical systems for improving cyber-security education,
Journal of Physics: Conference Series 1840 (2021) 012026. URL: https://iopscience.iop.org/
article/10.1088/1742-6596/1840/1/012026. doi:10.1088/1742-6596/1840/1/012026.
[16] C. Catal, A. Ozcan, E. Donmez, A. Kasif, Analysis of cyber security knowledge gaps
based on cyber security body of knowledge, Education and Information Technologies
28 (2023) 1809–1831. URL: https://link.springer.com/10.1007/s10639-022-11261-8. doi:10.
1007/s10639-022-11261-8.
[17] R. Pirta-Dreimane, A. Brilingaitė, G. Majore, B. J. Knox, K. Lapin, K. Parish, S. Sütterlin, R. G.</p>
      <p>Lugo, Application of intervention mapping in cybersecurity education design, Frontiers in
Education 7 (2022) 998335. URL: https://www.frontiersin.org/articles/10.3389/feduc.2022.
998335/full. doi:10.3389/feduc.2022.998335.
[18] J. Rajamäki, J. Nevmerzhitskaya, C. Virág, Cybersecurity education and training in
hospitals: Proactive resilience educational framework (prosilience ef), in: 2018 IEEE
Global Engineering Education Conference (EDUCON), 2018, pp. 2042–2046. doi:10.1109/
EDUCON.2018.8363488.
[19] C. Miller, C. Valasek, Adventures in automotive networks and control units, Def Con 21
(2013) 15–31.
[20] C. Miller, C. Valasek, Remote exploitation of an unaltered passenger vehicle, Black Hat</p>
      <p>USA 2015 (2015) 1–91.
[21] I. I. S. Organisation, ISO/SAE DIS 21434 Road vehicles—cybersecurity engineering, 2021.
[22] F. Sommer, J. Dürrwang, R. Kriesten, Survey and classification of automotive security
attacks, Information 10 (2019) 148. doi:10.3390/info10040148.
[23] Z. Rahmani, L. Barbosa, A. Pinto, Collision warning in vehicular networks based on
quantum secure multiparty computation, in: Anais do II Workshop de Comunicação e
Computação Quântica, SBC, Porto Alegre, RS, Brasil, 2022, pp. 19–24. URL: https://sol.sbc.
org.br/index.php/wquantum/article/view/21496. doi:10.5753/wquantum.2022.223569.
[24] D. Caivano, M. De Vincentiis, F. Nitti, A. Pal, Quantum optimization for fast can bus
intrusion detection, in: Proc. 1st Int. Workshop on Quantum Programming for SE, QP4SE
2022, ACM, 2022, p. 15–18. doi:10.1145/3549036.3562058.
[25] S. L. Wu, S. Sun, W. Guan, C. Zhou, J. Chan, C. L. Cheng, T. Pham, Y. Qian, A. Z. Wang,
R. Zhang, et al., Application of quantum machine learning using the quantum kernel
algorithm on high energy physics analysis at the lhc, Physical Review Research 3 (2021)
033221.
[26] V. Havlíček, A. D. Córcoles, K. Temme, A. W. Harrow, A. Kandala, J. M. Chow, J. M.</p>
      <p>Gambetta, Supervised learning with quantum-enhanced feature spaces, Nature 567 (2019)
209–212.
[27] D. P. García, J. Cruz-Benito, F. J. García-Peñalvo, Systematic literature review: Quantum
machine learning and its applications, arXiv preprint arXiv:2201.04093 (2022).
[28] M. T. Baldassarre, V. S. Barletta, D. Caivano, A. Piccinno, M. Scalera, Privacy knowledge
base for supporting decision-making in software development, in: C. Ardito, R. Lanzilotti,
A. Malizia, M. Larusdottir, L. D. Spano, J. Campos, M. Hertzum, T. Mentler, J. Abdelnour
Nocera, L. Piccolo, S. Sauer, G. van der Veer (Eds.), Sense, Feel, Design, Springer International
Publishing, Cham, 2022, pp. 147–157.
[29] ISO, ISO/SAE 21434:2021 - road vehicles — cybersecurity engineering, 2021. URL: https:
//www.iso.org/standard/70918.html.
[30] A. Sequeira, L. P. Santos, L. S. Barbosa, Policy gradients using variational quantum circuits,
Quantum Mach. Intell. 5 (2023) 1–15. doi:10.1007/s42484- 023- 00101- 8.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>V. S.</given-names>
            <surname>Barletta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Cassano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Pagano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Piccinno</surname>
          </string-name>
          ,
          <article-title>New perspectives for cyber security in software development: when end-user development meets artificial intelligence</article-title>
          ,
          <source>in: 2022 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)</source>
          ,
          <year>2022</year>
          , pp.
          <fpage>531</fpage>
          -
          <lpage>534</lpage>
          . doi:
          <volume>10</volume>
          .1109/3ICT56508.
          <year>2022</year>
          .
          <volume>9990622</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>M. T.</given-names>
            <surname>Baldassarre</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. S.</given-names>
            <surname>Barletta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Caivano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Piccinno</surname>
          </string-name>
          ,
          <article-title>A visual tool for supporting decision-making in privacy oriented software development</article-title>
          ,
          <source>in: Proceedings of the International Conference on Advanced Visual Interfaces</source>
          ,
          <source>AVI '20</source>
          ,
          <string-name>
            <surname>Association</surname>
          </string-name>
          for Computing Machinery, New York, NY, USA,
          <year>2020</year>
          . URL: https://doi.org/10.1145/3399715.3399818. doi:
          <volume>10</volume>
          .1145/3399715.3399818.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>C.</given-names>
            <surname>Catalano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Chezzi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Angelelli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Tommasi</surname>
          </string-name>
          ,
          <article-title>Deceiving ai-based malware detection through polymorphic attacks</article-title>
          ,
          <source>Computers in Industry</source>
          <volume>143</volume>
          (
          <year>2022</year>
          )
          <fpage>103751</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>V. S.</given-names>
            <surname>Barletta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Caivano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. D.</given-names>
            <surname>Vincentiis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Ragone</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Scalera</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. A. S.</given-names>
            <surname>Martin</surname>
          </string-name>
          ,
          <article-title>Vsoc4as: A vehicle-soc for improving automotive security</article-title>
          ,
          <source>Algorithms</source>
          <volume>16</volume>
          (
          <year>2023</year>
          ). doi:
          <volume>10</volume>
          . 3390/a16020112.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>J.</given-names>
            <surname>Dobaj</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Macher</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Ekert</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Riel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Messnarz</surname>
          </string-name>
          ,
          <article-title>Towards a security-driven automotive development lifecycle</article-title>
          ,
          <source>Journal of Software: Evolution and Process n/a (</source>
          <year>2021</year>
          )
          <article-title>e2407</article-title>
          . doi:https://doi.org/10.1002/smr.2407.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>L.</given-names>
            <surname>Haripriya</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Jabbar</surname>
          </string-name>
          ,
          <article-title>Role of machine learning in intrusion detection system: Review</article-title>
          , in: 2018 Second International Conference on Electronics,
          <source>Communication and Aerospace Technology (ICECA)</source>
          ,
          <year>2018</year>
          , pp.
          <fpage>925</fpage>
          -
          <lpage>929</lpage>
          . doi:
          <volume>10</volume>
          .1109/ICECA.
          <year>2018</year>
          .
          <volume>8474576</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>V. S.</given-names>
            <surname>Barletta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Caivano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Catalano</surname>
          </string-name>
          ,
          <string-name>
            <surname>M. De Vincentiis</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Pal</surname>
          </string-name>
          ,
          <article-title>Machine learning for automotive security in technology transfer</article-title>
          ,
          <source>in: Information Systems and Technologies - WorldCIST 2023</source>
          Volume
          <volume>1</volume>
          ,
          <year>2023</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Jose</surname>
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Martın-Guerrero</surname>
          </string-name>
          ,
          <article-title>Lucas Lamata, Quantum machine learning</article-title>
          ,
          <source>in: ESANN 2020 Proceedings, i6doc.com</source>
          ,
          <year>2020</year>
          , pp.
          <fpage>257</fpage>
          -
          <lpage>266</lpage>
          . URL: http://www.i6doc.com/en/.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>V. S.</given-names>
            <surname>Barletta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Caivano</surname>
          </string-name>
          ,
          <string-name>
            <surname>M. De Vincentiis</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Magrì</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Piccinno</surname>
          </string-name>
          ,
          <article-title>Quantum optimization for iot security detection</article-title>
          , in: V.
          <string-name>
            <surname>Julián</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Carneiro</surname>
            ,
            <given-names>R. S.</given-names>
          </string-name>
          <string-name>
            <surname>Alonso</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          <string-name>
            <surname>Chamoso</surname>
          </string-name>
          , P. Novais (Eds.),
          <source>Ambient Intelligence-Software and Applications-13th International Symposium on Ambient Intelligence</source>
          , Springer International Publishing, Cham,
          <year>2023</year>
          , pp.
          <fpage>187</fpage>
          -
          <lpage>196</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <article-title>European Union Agency for Cybersecurity., Cybersecurity education initiatives in the EU</article-title>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>