1. Karie NM, Sahri NM, Yang WC, Valli C, Kebande VR (2021) A review of security standards and frameworks for IoT-Based smart environments. IEEE Access 9:121975–121995
2. Qiu S, Wang D, Xu GA, Kumari S (2022) Practical and Provably Secure Three-Factor Authentication Protocol Based on Extended Chaotic-Maps for Mobile Lightweight Devices. IEEE Trans Dependable Secure Comput 19(2):1338–1351
3. Jason RC, Sadie C, David DR (2017) Security Risk Assessment in Internet of Things Systems. IT Professional 19(5):20–26
4. Basundhara B, Chanda K, Dilip KY (2021) Security risk assessment of information systems in an indeterminate environment. International conference on cloud computing, data science and engineering. Noida, India, pp 82–87
5. Ding SH, Qi N, Guo YW (2020) Evaluation of Simulated Defense Strategy Based on M-Fliplt Game Model. J Commun 41(07):186–194