1. Aazam, M., Huh, E. N., Zeadally, S., Harras, K. A., AbuKhousa, E., Mohamed, N., Al-Jaroodi, J., Access, O. P., Fung, C., Kadiyala, K., Jalali, F., Charlotte, U. N. C., Jue, J. P., Acm, I., Brogi, A., Forti, S., Ibrahim, A., Agarwal, S., Yadav, S., … Keyvanpour, M. R. (2017). Fog computing—Glimps of upcoming research area (#4). Future Generation Computer Systems, 5(2).
2. Abdulghani, H. A., Nijdam, N. A., Collen, A., & Konstantas, D. (2019). A study on security and privacy guidelines, countermeasures, threats: IoT data at rest perspective. Symmetry, 11(6). https://doi.org/10.3390/sym11060774
3. Airehrour, D., Gutierrez, J., & Ray, S. K. (2016). Secure routing for internet of things: A survey. Journal of Network and Computer Applications, 66. https://doi.org/10.1016/j.jnca.2016.03.006
4. Andión, J., Navarro, J. M., López, G., Álvarez-Campana, M., & Dueñas, J. C. (2018). Smart behavioral analytics over a low-cost IoT Wi-Fi tracking real deployment. Wireless Communications and Mobile Computing, 2018. https://doi.org/10.1155/2018/3136471
5. Antonakakis, M., April, T., Bailey, M., Bernhard, M., Bursztein, E., Cochran, J., ... & Zhou, Y. (2017). Understanding the Mirai botnet. In 26th USENIX security symposium (USENIX Security 17) (pp. 1093–1110). https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/antonakakis