1. When firmware modifications attack: A case study of embedded exploitation;Cui,2013
2. The rise of “Internet of Things”: Review and open research issues related to detection and prevention of IoT-based security attacks;Shafiq;Wirel. Commun. Mob. Comput.,2022
3. An overview of the Internet of Things for people with disabilities;Domingo;J. Netw. Comput. Appl.,2012
4. Designing an assistive dialog agent for a case of spinal cord injury;Hsieh,2009
5. Decentralized public key infrastructure for internet-of-things;Won,2018