1. Iqbal MA, Olaleye OG, Bayoumi MA (2017) A review on Internet of Things (IoT): security and privacy requirements and the solution approaches, Global Journal of Computer Science and Technology
2. Arias O, Ly K, Jin Y (2017) Security and privacy in IoT era. In: Smart Sensors at the IoT Frontier. Springer, pp 351–378
3. Halperin D, Heydt-Benjamin TS, Ransford B, Clark SS, Defend B, Morgan W, Fu K, Kohno T, Maisel WH (2008) Pacemakers and implantable cardiac defibrillators: software radio attacks and zero-power defenses. In: IEEE Symposium on Security and Privacy, 2008. SP 2008. IEEE, pp 129–142
4. Checkoway S, McCoy D, Kantor B, Anderson D, Shacham H, Savage S, Koscher K, Czeskis A, Roesner F, Kohno T et al (2011) Comprehensive experimental analyses of automotive attack surfaces. In: USENIX Security Symposium San Francisco
5. Ray S, Peeters E, Tehranipoor M, Bhunia S (2017) System-on-chip platform security assurance: architecture and validation. In: Proceedings of the IEEE