1. Evidence identification in IoT networks based on threat assessment;Akatyev;Future Gener. Comput. Syst.,2019
2. Clustering-based real-time anomaly detection—a breakthrough in big data technologies;Ariyaluran Habeeb;Trans. Emerg. Telecommun. Technol.,2019
3. Industrial IoT security threats and concerns by considering Cisco and Microsoft IoT reference models;Bakhshi,2018
4. A wolf in sheep's clothing: spreading deadly pathogens under the disguise of popular music;Barua,2022
5. Pattern analysis of oxygen saturation variability in healthy individuals: entropy of pulse oximetry signals carries information about mean oxygen saturation;Bhogal;Front. Physiol.,2017