1. Ramesh, M.R.R., Reddy, C.S.: A survey on security requirement elicitation methods: classification, merits, and demerits. Int. J. Appl. Eng. Res. 11(1), 64–70 (2016)
2. Kamalrudin, M., Ibrahim, A.A., Sidek, S.: A Security Requirements Library for the Development of Internet of Things (IoT) Applications, Communications in Computer and Information Science, vol. 809. Springer, Singapore (2018). https://doi.org/10.1007/978-981-10-7796-8_7
3. The International Telecommunication Union (ITU). https://www.itu.int/rec/dologin_pub.asp?lang=e&id=T-REC-Y.2060-201206-I!!PDF-E&type=items. Accessed 30 Nov 2020
4. Rose, K., Eldridge, S., Chapin, L.: The Internet of Things: An Overview Understanding the Issues of a More Connected World (2015)
5. Tankard, C.: The security issues of the Internet of Things. Comput. Fraud Secur. 2015(9), 11–14 (2015)