1. Karie NM, Sahri NM, Haskell-Dowland P (2020) IoT threat detection advances, challenges, and future directions. In: Proceedings of the 2020 Workshop on Emerging Technologies for Security in IoT (ETSecIoT), Sydney, N.S.W., Australia, 21–21:pp. 22–29
2. Deogirikar J, Vidhate A (2017) Security attacks in IoT: A survey. In Proceedings of the 2017 International Conference on ISMAC (IoTin Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, India, 10–11 February 2017; pp. 32–37
3. Gurunath R, Agarwal M, Nandi, A, Samanta (2020) An overview: Security issue in IoT network. In: Proceedings of the 2nd International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Tirunelveli, India, 29–30 October2020; pp. 104–107
4. Yang W, Wang S, Hu J, Ibrahim A, Zheng G, Macedo M, Johnstone M, Valli C (2019) A cancelable iris- and steganography-based user authentication system for the Internet of Things. Sensors 19:2985
5. Cherapau I, Muslukhov I, Asanka N, Beznosov K (2011) On the impact of Touch ID on iPhone passcodes. Proceedings of the eleventh symposium on usable privacy and security, Pittsburgh, Pennsylvania 20–22:257–276