1. The stakes have changed: No end in sight for ddos attack size growth;Networks,2017
2. Turning internet of things (IoT) into internet of vulnerabilities (iov): IoT botnets;Angrishi,2017
3. Proposed embedded security framework for internet of things (IoT);Babar,2011
4. Crypto-jacking: How cyber-criminals are exploiting the crypto-currency boom;Sigler;Comput. Fraud Secur.,2018
5. IoTPOT: Analysing the Rise of IoT Compromises;Pa,2015