1. Kumar P, Braeken A, Gurtov A, Iinatti J, Ha P H. Anonymous secure framework in connected smart home environments. IEEE Transactions on Information Forensics and Security, 2017, 12(4): 968–979. DOI: https://doi.org/10.1109/TIFS.2016.2647225.
2. Stanislav M, Beardsley T. HACKING IoT: A case study on baby monitor exposures and vulnerabilities. Rapid7, 2015. https://www.rapid7.com/globalassets/external/docs/Hacking-IoT-A-Case-Study-on-Baby-Monitor-Exposuresand-Vulnerabilities.pdf, Mar. 2023.
3. Antonakakis M, April T, Bailey M, Bernhard M, Bursztein E, Cochran J, Durumeric Z, Halderman J A, Invernizzi L, Kallitsis M, Kumar D, Lever C, Ma Z E, Mason J, Menscher D, Seaman C, Sullivan N, Thomas K, Zhou Y. Understanding the Mirai botnet. In Proc. the 26th USENIX Conference on Security Symposium, Aug. 2017, pp.1093–1110.
4. Fernandes E, Jung J, Prakash A. Security analysis of emerging smart home applications. In Proc. the 2016 IEEE Symposium on Security and Privacy, May 2016, pp.636–654. DOI: 10.1109/SP.2016.44.
5. Zhang N, Mi X H, Feng X, Wang X F, Tian Y, Qian F. Dangerous skills: Understanding and mitigating security risks of voice-controlled third-party functions on virtual personal assistant systems. In Proc. the 2019 IEEE Symposium on Security and Privacy, May 2019, pp.1381–1396. DOI: 10.1109/SP.2019.00016.