compscience literature review matrix needs completed

Below are 7 articles that need a literature review matrix.For information on one looks, you may visit this link: https://writingcenter.fiu.edu/resources/synthesis-matrix-2.pdf

The idea is to gather information based on trends in cybersecurity, cloud security and virtualization pros and cons from each article.

Magoni, D., & Pansiot, J. J. (2001). Analysis of the autonomous system network topology. ACM SIGCOMM Computer Communication Review, 31(3), 26-37. Retrieved from; https://dl.acm.org/citation.cfm?id=505663

Mehmood, H. (2017). August 8th, 2017 Global Sign Blog: How Top Industries Are Preparing For Evolving Cybersecurity Threats. Retrieved from; https://www.globalsign.com/en/blog/top-industries-preparing-for-evolving-cybersecurity-threats/

Passeri, P. (2017). September 2017 Cyber Attacks Statistics. Hackmageddon Information Security Timelines and Statistics. Retrieved from; http://www.hackmageddon.com/2017/10/20/september-2017-cyber-attacks-statistics/

Rajeyyagari, S., & Alotaibi, A. S. (2018). A study on cyber-crimes, threats, security and its emerging trends on latest technologies: influence on the Kingdom of Saudi Arabia. International Journal of Engineering & Technology, 7(2.3), 54-58. Available from: https://www.sciencepubco.com/index.php/ijet/article/download/9969/3500

Reveron, D. S. (Ed.). (2012). Cyberspace and national security: threats, opportunities, and Power in a virtual world. Georgetown University Press. Retrieved from; https://www.acs.org.au/content/dam/acs/acs-publications/ACS_Cybersecurity_Guide.pdf

Rowe, B. R., & Gallaher, M. P. (2006, March). Private sector cybersecurity investment Strategies: An empirical analysis. In The fifth workshop on the economics of information security (WEIS06). Retrieved from; https://pdfs.semanticscholar.org/a188/0f3fc72ab11f5eca24fa6970eb2a8ab69c4f.pdf

Yan, Y., Qian, Y., Sharif, H., & Tipper, D. (2012). A survey on cybersecurity for smart grid Communications. IEEE Communications Surveys and Tutorials, 14(4), 998-1010. Retrieved from; http://ieeexplore.ieee.org/document/6141833/