Use of a non-peer reviewed sources in cyber-security scientific research | IEEE Conference Publication | IEEE Xplore