1. Chaabouni, N., Mosbah, M., Zemmari, A., Sauvignac, C., Faruki, P.: Network intrusion detection for IoT security based on learning techniques. IEEE Commun. Surv. Tutorials. 21(3), 2671–2701 (2019)
2. Rathore, S., Kwon, B.W., Park, J.H.: BlockSecIoTNet: blockchain-based decentralized security architecture for IoT network. J. Netw. Comput. Appl., 167–177 (2019)
3. Rizvi, S., Orr, R., Cox, A., Ashokkumar, P., Rizvi, M.R.: Identifying the attack surface for IoT network. Internet Things. 9 (2020)
4. Alnaeli, S.M., Sarnowski, M., Aman, M.S., Abdelgawad, A., Yelamarthi, K.: Vulnerable C/C++ code usage in IoT software systems. In: IEEE 3rd World Forum on Internet of Things (WF-IoT), Reston, VA, USA (2016)
5. McBride, J., Arief, B., Hernandez-Castro, J.: Security analysis of Contiki IoT operating system. In: EWSN(2018): International Conference on Embedded Wireless Systems and Networks (2018)