1. HIPAA Journal. https://www.hipaajournal.com/87pc-healthcare-organizations-adoptinternet-of-things-technology-2019-8712
2. Dharavath, K., Talukdar, F. A, & Laskar R. H. (2013). Study on biometric authentication systems, challenges and future trends. In IEEE International conference on computational intelligence and computing research, pp. 1–7.
3. Hussain, S., Kamal, A., Ahmad, S., Rasool, G., & Iqbal, S. (2014). Threat modelling methodologies: A survey. Sci. Int., 26(4), 1607.
4. Möckel, C., & Abdallah, A. E. (2010) 2010 6th International conference on information assurance and security, IAS 2010, pp. 149–154.
5. Johnstone, M. N. (2010). Threat modelling with stride and UML. In Australian information security management conference (November), vol. 18.