1. Accessed, : 2019-11-20, https://msrc-blog.microsoft.com/2019/08/05/corporate-iot-a-path-to-intrusion/.
2. Cyber-attack modeling analysis techniques: An overview;Al-Mohannadi,2016
3. Lightweight encryption for smart home;Al Salami,2016
4. A survey on advanced persistent threats: techniques, solutions, challenges, and research opportunities;Alshamrani;IEEE Commun. Surv. Tutor.,2019
5. Anomaly detection in computer networks: astate-of-the-Art review.;Baddar;JoWUA,2014