Publisher
Springer Nature Singapore
Reference44 articles.
1. Schmidt S, Mazurczyk W, Kulesza R, Keller J, Caviglione L (2018) Exploiting ip telephony with silence suppression for hidden data transfers. Comput Secur 79:17–32
2. Mikusz M, Houben S, Davies N, Moessner K, Langheinrich M (2018) Raising awareness of iot sensor deployments
3. Ullah I, Mahmoud QH (2021) Design and development of a deep learning-based model for anomaly detection in iot networks. IEEE Access 9:103906–103926
4. Lee C, Ahmed G (2021) Improving iot privacy, data protection and security concerns. Int J Technol Innov Manage (IJTIM) 1(1):18–33
5. Antonakakis M, April T, Bailey M, Bernhard M, Bursztein E, Cochran J, Durumeric Z, Halderman JA, Invernizzi L, Kallitsis, M et al (2017) Understanding the mirai botnet. In: 26th $$\{USENIX\}$$ security symposium ($$\{USENIX\}$$ security 17), pp 1093–1110