1. Y. Intrusion detection system: A comprehensive review;Liao HJ;J. Netw. Comput. Appl.,2013
2. A survey on internet of things security: Requirements, challenges, and solutions;HaddadPajouh H;Internet of Things (Netherlands),2021
3. Nature-inspired algorithms for Wireless Sensor Networks: A comprehensive survey;Singh A;Comput. Sci. Rev.,2021
4. Zheng, Z., Xie, S., Dai, H., Chen, X. & Wang, H. An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends. Proc. – 2017 IEEE 6th Int. Congr. Big Data, BigData Congr. 2017 557–564 (2017).
5. Mahmood, T. & Afzal, U. Security Analytics: Big Data Analytics for Cybersecurity. 2013 2nd Natl. Conf. Inf. Assur. 129–134 (2013).