1. [1] Cui, A. and Salvatore, J.S.: A quantitative analysis of the insecurity of embedded network devices: Results of a widearea scan (online), available from <http://ids.cs.columbia.edu/sites/default/files/paper-acsac.pdf> (accessed 2015-05-24).
2. [2] Internet Census 212 (online), available from <http://internetcensus2012.bitbucket.org/paper.html> (accessed 2015-05-24).
3. [3] DailyTech — Hackers Use Refrigerator, Other Devices to Send 750, 000 Spam Emails (online), available from <http://www.dailytech.com/Hackers+Use+Refrigerator+Other+Devices+to+Send+750000+Spam+Emails+/article34161.htm> (accessed 2015-05-24).
4. [4] Lizard Stresser Runs on Hacked Home Routers — Krebs on Security (online), available from <http://krebsonsecurity.com/2015/01/lizard-stresser-runs-on-hacked-home-routers/> (accessed 2015-05-24).
5. [5] BusyBox (online), available from <http://www.busybox.net/> (accessed 2015-10-30).