1. Ray, P.P.: A survey on Internet of Things architectures. J. King Saud Univ. – Comput. Inform. Sci. 30(3), 291–319 (2018)
2. Liang, F., Hatcher, W.G., Liao, W., Gao, W., Yu, W.: Machine learning for security and the internet of things: the good, the bad, and the ugly. IEEE Access 7, 158126–158147 (2019)
3. Zanella, A., Bui, N., Castellani, A., Vangelista, L., Zorzi, M.: Internet of things for smart cities. IEEE Internet of Things J. 1(1), 22–32 (2014)
4. Patwary, A.A.N., Fu, A., Naha, R.K., Battula, S.K., Garg, S., Patwary, M.A.K., Aghasian, E.: Authentication, access control, privacy, threats and trust management towards securing fog computing environments: a review. arXiv preprint arXiv:2003.00395 (2020)
5. Krašovec, A., Pellarini, D., Geneiatakis, D., Baldini, G., Pejović, V.: Not quite yourself today: behaviour-based continuous authentication in IoT environments. Proc. ACM on Interact. Mob. Wearable Ubiquitous Technol. 4(4), 1–29 (2020)