1. Deepak K, Kelly S, Benton C, Deepali G, Galina A, Dmitry K, Rajarshi G, Zakir D (2019) All things considered: an analysis of IoT devices on home networks. In: 28th USENIX security symposium (USENIX Security 19), pp 1169–1185. ISBN 978-1-939133-06-9. https://www.usenix.org/conference/usenixsecurity19/presentation/kumar-deepak
2. Raj B, Bob G, Dennis S, Kevin J, David W (2021) Magic quadrant for cloud infrastructure and platform services. Technical report, Gartner Inc., July. https://www.gartner.com/doc/reprints?id=1-271OE4VR &ct=210802
3. Manos A, Tim A, Michael B, Matt B, Elie B, Jaime C, Zakir D, Alex HJ, Invernizzi L, Michalis K, Deepak K, Chaz L, Zane M, Joshua M, Damian M, Chad S, Nick S, Kurt T, Zhou Y (2017) Understanding the mirai botnet. In: 26th USENIX security symposium (USENIX Security 17), pp 1093–1110, Vancouver, BC, August. USENIX Association. ISBN 978-1-931971-40-9. https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/antonakakis
4. CVE-2021-28372. Available from MITRE, CVE-ID CVE-2021-28372., March 13 2021. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28372
5. Corno F, De Russis L, Mannella L (2021) Perception of security issues in the development of Cloud-IoT systems by a novice programmer. In: Intelligent environments 2021, pp 5–15. IOS Press. https://doi.org/10.3233/AISE210074