1. Software Vulnerability Analysis Using CPE and CVE;sanguino,2017
2. Information Exposure From Consumer IoT Devices
3. Cyber Security Threats Detection in Internet of Things Using Deep Learning Approach;ullah,2020
4. MaDIoT 2.0: Modern High-Wattage IoT Botnet Attacks and Defenses;shekari;31st USENIX Security Symposium (USENIX Security 22),2022