1. Classifying RFID attacks and defenses
2. A. Mukaddam, I. Elhajj, A. Kayssi, A. Chehab, “IP spoofing detection using modified hop count,” In 2014 IEEE 28th International Conference on Advanced Information Networking and Applications, IEEE, pp. 512-516, 2014.
3. A. K. Sahoo, A. Das, M. Tiwary, “Firewall engine based on graphics processing unit,” In 2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies, IEEE, pp. 758-763, 2014.
4. An overview of internet of things (IoT): Definitions, architecture, security, applications and future directions;Ibrahim Hameed;International Journal of Engineering in Computer Science,2019
5. Applied Cryptography;Schneier,1996