1. Sparks, P., The route to a trillion devices, White Paper, ARM. 2017. https://community.arm.com/cfs-file/__key/telligent-evolution-components-attachments/01-1996-00-00-00-01-30-09/ARM-_2D00_-The-route-to-a-trillion-devices-_2D00_-June-2017.pdf.
2. Stanislav, M. and Beardsley, T., Hacking IoT: A case study on baby monitor exposures and vulnerabilities, Rapid7 Report, 2015. https://media.kasperskycontenthub.com/wp-content/uploads/sites/63/2015/11/21031739/Hacking-IoT-A-Case-Study-on-Baby-Monitor-Exposures-and-Vulnerabilities.pdf.
3. Platonov, V.V. and Semenov, P.O., Detection of abnormal traffic in dynamic computer networks with mobile consumer devices, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 959–964. https://doi.org/10.3103/S0146411618080217
4. Krundyshev, V.M., Preparing datasets for training in a neural network system of intrusion detection in industrial systems, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 1012–1016. https://doi.org/10.3103/S0146411619080121
5. Krundyshev, V. and Kalinin, M., Hybrid neural network frame work for detection of cyber attacks at smart infrastructures, Proc. 12th Int. Conf. on Security of Information and Networks, Sochi, Russia, 2019, New York: Association for Computing Machinery, 2019, pp. 1–7. https://doi.org/10.1145/3357613.3357623