1. [1] Symantec Security Response team: Internet Security Threat Report, Vol.24 (Feb. 2019), available from <https://docs.broadcom.com/doc/istr-24-executive-summary-en >
2. [2] IoTPOT project of Yoshioka Lab, available from <https://sec.ynu.codes/iot/ >
3. [3] Stock, B., Pellegrino, G., Li, F., Backes, M. and Rossow, C.: Didnt You Hear Me Towards More Successful Web Vulnerability Notifications, The Network and Distributed System Security Symposium (NDSS) (2018).
4. [4] Shen, Y., Vervier, P.A. and Stringhini, G.: Understanding Worldwide Private Information Collection on Android, The Network and Distributed System Security Symposium (NDSS 2019), pp.1-16 (2019).
5. [5] Cetin, O., Ganan, C., Altena, L., Inoue, D., Kasama, T., Tamiya, K., Tie, Y., Yoshioka, K., et al.: Cleaning Up the Internet of Evil Things: Real-World Evidence on ISP and Consumer Efforts to Remove Mirai, The Network and Distributed System Security Symposium (NDSS) (2019).