1. Al-Garadi, M.A., Mohamed, A., Al-Ali, A., Du, X., Ali, I., Guizani, M.: A survey of machine and deep learning methods for internet of things (IoT) security. IEEE Commun. Surv. Tuts. 22(3), 1646–1685 (2020)
2. Andersen, M.P., et al.: WAVE: a decentralized authorization framework with transitive delegation. In: Proceedings of USENIX Security 2019, pp. 1375–1392. USENIX Association (2019)
3. Antonakakis, M., et al.: Understanding the mirai botnet. In: Proceedings of USENIX Security 2017, pp. 1093–1110. USENIX Association (2017)
4. Bellare, M.: New proofs for NMAC and HMAC: security without collision-resistance. In: Proceedings of CRYPTO 2006. LNCS, vol. 4117, pp. 602–619. Springer, Berlin, Heidelberg (2006)
5. Bellare, M., Goldreich, O., Mityagin, A.: The power of verification queries in message authentication and authenticated encryption. Cryptology ePrint Archive, Report 2004/309 (2004)