1. Alake, R.: Understanding cosine similarity and its application (2021). https://towardsdatascience.com/understanding-cosine-similarity-and-its-application-fd42f585296a
2. Alrawi, O., Lever, C., Antonakakis, M., Monrose, F.: SoK: security evaluation of home-based IoT deployments. In: IEEE SP. IEEE (2019)
3. Amazon IoT device simulator. https://aws.amazon.com/solutions/implementations/iot-device-simulator/
4. Anthi, E., Williams, L., Słowińska, M., Theodorakopoulos, G., Burnap, P.: A supervised intrusion detection system for smart home IoT devices. IEEE Internet Things J. 6(5), 9042–9053 (2019)
5. Antonakakis, M., et al.: Understanding the Mirai botnet. In: USENIX Security (2017)