1. Albahar, M., Haataja, K., Toivanen, P.: Bluetooth MITM vulnerabilities: a literature review, novel attack scenarios, novel countermeasures, and lessons learned. Int. J. Inf. Technol. Secur. 8, 25–49 (2016)
2. Antonakakis, M., et al.: Understanding the Mirai Botnet. In: 26th USENIX Security Symposium (USENIX Security 17), pp. 1093–1110, August 2017
3. Botchkarev, A.: Performance metrics (error measures) in machine learning regression, forecasting and prognostics: properties and typology (2018)
4. Box, G.E.P., Jenkins, G.M.: Time Series Analysis: Forecasting and Control, 3rd edn. Prentice Hall PTR, USA (1994)
5. Cayre, R., Roux, J., Alata, E., Nicomette, V., Auriol, G.: Mirage: un framework offensif pour l’audit du bluetooth low energy. In: Symposium sur la Sécurité des Technologies de l’Information et des Communications (SSTIC 2019) (2019)