1. Farash, M. S., Turkanović, M., Kumari, S., & Holbl, M. (2016). An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the internet of things environment. Ad Hoc Networks, 36, 152–176.
2. Forbes Inc. (2018). The Internet Of Things: From theory to reality-how companies are leveraging IoT to move their businesses forward. Retrieved 2017, from https://www.forbes.com/forbes-insights/our-work/internet-of-things/.
3. Gartner. (2018). Gartner identifies top 10 strategic IoT technologies and trends. Retrieved 7, November 2018, from https://www.gartner.com/en/newsroom/press-releases/2018-11-07-gartner-identifies-top-10-strategic-iot-technologies-and-trends.
4. Finjan Inc. (2016). Smart card attacks—A look at how hardware tokens are being exploited. Retrieved 19, September 2016, from https://blog.finjan.com/smart-card-attacks-a-look-at-how-hardware-tokens-are-being-exploited/.
5. Chen, J., Diao, W., Zhao, Q., Zuo, C., Lin, Z., Wang, X., et al. (2018). IoTFuzzer: Discovering memory corruptions in IoT through app-based fuzzing. In NDSS.