1. Yang, Y., et al.: General theory of security and a study case in internet of things. IEEE Internet Things J. 4(2), 1 (2016)
2. Verma, H., Jain, M., Goel, K., Virkram, A., Verma, G.: Smart home system based on Internet of Things. In: 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), pp. 2073–2075. IEEE, 31 October 2016
3. Salamat, B., Jackson, T., Wagner, G., et al.: Runtime defense against code injection attacks using replicated execution. IEEE Trans. Dependable Secure Comput. 8(4), 588–601 (2011)
4. Lin, Y., Quan, Y.: Dynamially-Enabled Cyberspace Defense, 1st edn. The People’s Posts and Telecommunications Press (Posts & Telecom Press), Beijing (2016). pp. 214–215
5. Liu, Y., Hu, S., Ho, T.-Y.: Vulnerability assessment and defense technology for smart home cybersecurity considering pricing cyberattacks. In: Computer-Aided Design (ICCAD), pp. 183-190. IEEE, 08 January 2015