1. Ahmad, I., Basheri, M., Iqbal, M.J., Rahim, A.: Performance comparison of support vector machine, random forest, and extreme learning machine for intrusion detection. IEEE Access 6, 33789–33795 (2018)
2. Alabsi, B.A., Anbar, M.: A comprehensive review on security attacks in dynamic wireless sensor networks based on RPL protocol. Int. J. Pure Appl. Math. 119(12), 12481–12495 (2018)
3. Ambili, K., Jose, J.: TN-IDS for network layer attacks in RPL based IoT systems. IACR Cryptol. ePrint Arch. 2020, 1094 (2020)
4. Ashton, K., et al.: That ‘internet of things’ thing. RFID J. 22(7), 97–114 (2009)
5. Bengio, Y.: Learning deep architectures for AI. Found. Trends® Mach. Learn. 2(1), 1–127 (2009). https://doi.org/10.1561/2200000006. ISSN 1935-8237