##article.return## Cybersecurity and validation methods of online computing systems: a systematic mapping of the literature Download Download PDF