1. https://justcreative.com/internet-of-things-explained/
2. B. Gautam, J. Tripathi, S. Singh, A secure coding approach for prevention of SQL injection attacks. Int. J. Appl. Eng. Res. 13(11), 9874–9880 (2018)
3. M. Conti, N. Dragoni, V. Lesyk, A survey of man in the middle attacks. IEEE Commun. Surv. Tutor. 18(3), 2027–2051 (2016)
4. T.H. Nguyen, M. Yoo, A hybrid prevention method for eavesdropping attack by link spoofing in software-defined Internet of Things controllers. Int. J. Distrib. Sens. Netw. 13(11), 1550147717739157 (2017)
5. S.G. Najafabadi, H.R. Naji, A. Mahani, Sybil attack Detection: improving security of WSNs for smart power grid application, in Smart Grid Conference (SGC) (IEEE, 2013), pp. 273–278