1. Internet of Things applications: opportunities and threats;Rahmani;Wirel. Pers. Commun.,2022
2. A secure edge computing model using machine learning and IDS to detect and isolate intruders;Mahadevappa;MethodsX,2024
3. V. Choudhary, S. Tanwar and A. Rana, “Demystifying security and applications of Internet of Things,” Proceedings of the 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), Noida, India, pp. 1–5, doi:10.1109/ICRITO51393.2021.9596471.
4. A review of security and privacy concerns in the Internet of Things (IoT);Aqeel;J. Sens.,2022
5. A survey on security in internet of things with a focus on the impact of emerging technologies;Williams;Internet Things (Netherlands),2022