Author:
Ahmadi Sharar,Dongol Brijesh,Griffin Matt
Reference26 articles.
1. Demystifying IoT security: an exhaustive survey on IoT vulnerabilities and a first empirical look on Internet-scale IoT exploitations;Neshenko;IEEE Commun. Surv. Tutor.,2019
2. Threats to the swarm: security considerations for swarm robotics;Higgins;Int. J. Adv. Secur.,2009
3. Electricity for free? The dirty underbelly of SCADA and smart meters;Pollet;Proc. Black Hat USA,2010
4. A survey SCADA of and critical infrastructure incidents;Miller,2012
5. Attestation in wireless sensor networks: a survey;Steiner;ACM Comput. Surv.,2016