[5] B. Perls and L. Susskind, "Municipal cybersecurity: More work needs to be done," Urban Affairs Rev., vol. 58, pp. 614-629, Mar. 2022, doi: 10.1177/1078087420973760.
[3] K. Walker, "Big data and the cloud," IQ: The RIMPA Quart. Mag., vol. 30, p.3, Feb. 2014. [Online]. Available: https://search.informit.org/doi/10.3316/informit.867181037905842
Perls and Susskind [5] demonstrate that …
as quoted [3, p. 3] …
[2] C. Wang and K. Chen, "Analysis of network information retrieval method based on metadata ontology," Int. J. Antennas Propag., vol. 2022, Sept. 2022, Art. no. 2664639, doi: 10.1155/2022/2664639.
Wang and Chen [2] observed the following …
For example, see [2] …
[9] L. Sasal, T. Chakraborty, and A. Hadid, "W-transformers: A wavelet-based transformer framework for univariate time series forecasting," Sep., 2022, arXiv: 2209.03945, doi: 10.48550/arXiv.2209.03945.
as demonstrated by Sasal et al. [9] …
as argued [9, Sec. IV] …
[3] Q. Huang and X. Jin, "The effect of the universal two-child policy on female labour market outcomes in China," Econ. Labour Relations Rev., early access, 2022. doi: 10.1177/10353046221112716.
Huang and Jin [3] noted that …
as demonstrated earlier [3, para. 4-5] …
[6] D. Alterman and J. Rauch, "Diffractive nonlinear geometric optics for short pulses," Siam J. on Math. Anal., vol. 34, pp. 1477-1502, 2003.
Alterman and Rauch [6] argued that …
For example, see [6] …