1. Springer. Security, trust and implementation limitations of prominent IoT platforms;Satyadevan;Proceedings of the 3-rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA),2015
2. Common vulnerability scoring system [Online], Available: https://www.first.org/cvss/. 2015, (Accessed 16/03/2023).
3. Can the common vulnerability scoring system be trusted? a bayesian analysis;Johnson;IEEE Transactions on Dependable and Secure Computing,2016
4. Wireless security auditing: attack vectors and mitigation strategies;A Devi;Procedia Computer Science,2017
5. National Vulnerability Database [Online], Available: https://nvd.nist.gov/. 2022, (Accessed 01/05/2023).