1. Antonakakis, M., April, T., Bailey, M., Bernhard, M., Bursztein, E., Cochran, J., Durumeric, Z., Halderman, J. A., Invernizzi, L., Kallitsis, M., et al.: Understanding the Mirai botnet. In: 26th USENIX security symposium USENIX Security 17), pp. 1093–1110 (2017)
2. Gupta, A.P: The IoT Hacker’s Handbook: A Practical Guide to Hacking the Internet of Things. Apress (2019)
3. PatrIoT artifacts. https://github.com/beyefendi/penbook/. Accessed: 06 Dec 2021 (2021)
4. Rathore, B., Brunner, M., Dilaj, M., Herrera, O., Brunati, P., Subramaniam, R., Raman, S., Chavan, U.: Information systems security assessment framework (ISSAF), Draft 0.2 B 1 2006 (2006)
5. Herzog, P.: Osstmm 3 the open source security testing methodology manual. Contemporary security testing and analysis, ISECOM-Institute for Security and Open Methodologies