1. Casarona, J., McHale, L., McDougall, L., Gunreddy, V., Cantrell, M., Gora, M., Morozov, S., Maiti, A., Kim, I., Schaumont, P.: Research on Physical Unclonable Functions (PUFs) at SES Lab, VT, Retrieved Oct 2018 from Virginia Tech’s Bradley Department of Electrical & Computer Engineering Website: http://rijndael.ece.vt.edu/puf/background.html (2011)
2. Hamilton, D.: Best practices for IoT security. Retrieved Sept 2018 from Network World’s Website: https://www.networkworld.com/article/3266375/internet-of-things/best-practices-for-iot-security.html (2018, March 27)
3. Internet of Secure Things: what is really needed to secure the Internet of Things?. Retrieved Oct 2018 from Icon Labs’ website: https://www.iconlabs.com/prod/internet-secure-things-%E2%80%93-what-really-needed-secure-internet-things (2018)
4. Kepes, B.: Forget two-factor authentication, here comes context-aware authentication. Retrieved 31 Oct 2018 from Computer World’s Website: https://www.computerworld.com/article/3105866/application-security/forget-two-factor-authentication-here-comes-context-aware-authentication.html (2016, Aug 15)
5. Kerner, S.M.: DDoS Attack Snarls friday morning traffic. Retrieved 21 Oct 2018 from eWeek’s Website: http://www.eweek.com/security/ddos-attack-snarls-friday-morning-internet-traffic (2016, Oct 21)