1. Haller, S., Karnouskos, S., Schroth, C.: The internet of things in an enterprise context. In: Future Internet-FIS 2008. Lecture Notes in Computer Science, vol. 5468, pp. 14–28 (2009)
2. Roman, R., Najera, P., Lopez, J.: Securing the Internet of Things. IEEE Computer Society Press, Los Alamitos (2011)
3. Mattern, F., Floerkemeier, C.: From the internet of computers to the internet of things. Lecture Notes in Computer Science (LNCS), vol. 6462, pp. 242–259 (2010)
4. Kong, J.H., Ang, L.-M., Seng, K.P.: Minimalist security and privacy schemes based on enhanced AES for integrated WISP sensor networks. J. Commun. Netw. Distrib. Syst. 11(2), 214–232 (2013)
5. de la Hoz, E., Ortiz, A., Ortega, J., Martinez-Alvarez, A.: Feature selection by multi-objective optimization: application to network anomaly detection by hierarchical self organising maps. Knowl. Based Syst. 71, 322–338 (2014)