1. Amadeo, M., Campolo, C., Iera, A., Molinaro, A.: Information centric networking in IoT scenarios: the case of a smart home. In: 2015 IEEE International Conference on Communications (ICC), pp. 648–653 (2015)
2. Anand, P., Singh, Y., Selwal, A., Alazab, M., Tanwar, S., Kumar, N.: IoT vulnerability assessment for sustainable computing: threats, current solutions, and open challenges. IEEE Access 8, 168825–168853 (2020)
3. Antonakakis, M., et al.: Understanding the mirai botnet. In: 26th $$\{$$USENIX$$\}$$ security symposium ($$\{$$USENIX$$\}$$ Security 17), pp. 1093–1110 (2017)
4. Apthorpe, N., Reisman, D., Feamster, N.: A smart home is no castle: privacy vulnerabilities of encrypted IoT traffic (2017)
5. Bassi, A., et al.: Enabling Things to Talk: Designing IoT solutions with the IoT Architectural Reference Model. Springer, Berlin Heidelberg (2013)