1. Boddy, S., Shattuck, J.: Threat Analysis Report. The Hunt for IoT. The Growth and Evolution of Thingbots Ensures Chaos (2018). https://www.f5.com/labs/articles/threat-intelligence/the-hunt-for-iot-the-growth-and-evolution-of-thingbots-ensures-chaos . Accessed 25 June 2018
2. Cherdantseva, Y., Burnap, P., Blyth, A., Eden, P., Jones, K., Soulsby, H., Stoddart, K.: A review of cyber security risk assessment methods for SCADA systems. Comput. Secur. 56, 1–27 (2016)
3. Cisco: Cisco 2017 annual security report. Technical report (2017)
4. Cook, E., Kearney, P.: Security challenges and cybercrime. J. Inst. Telecommun. Prof. 9, 22–25 (2015)
5. Common vulnerability scoring system sig. https://www.first.org/cvss/ . Accessed 09 Apr 2018