1. Abomhara M, Køien GM (2015) Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks. J Cyber Secur 4(1):65–88
2. Alexander D, Finch A, Sutton D, Taylor A, Taylor A (2013) Information security management principles, 2nd edn. BCS, The Chartered Institute for IT, Swindon
3. Alghuried A (2017) A model for anomalies detection in internet of things (IoT) using inverse weight clustering and decision tree. Semantic scholar. https://doi.org/10.21427/D7WK7S
4. Aljawarneh S, Toth T, Yassein MB (2018) Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model. J Comput Sci 25:152–160
5. Andreev S, Koucheryavy Y (2012) Internet of things, smart spaces, and next generation networking. LNCS, vol 7469. Springer, Berlin, pp 464