1. Aazam, M., St-Hilaire, M., Lung, C.-H., & Lambadaris, I. (2016). PRE-Fog: IoT trace based probabilistic resource estimation at Fog. 13th IEEE Annual Consumer Communications & Networking Conference (CCNC).
2. Aloul, F., Zualkernan, I., & Mahmoud, R. (2015). Internet of things (IoT) security: Current status, challenges and prospective measures. 10th International Conference for Internet Technology and Secured Transactions (ICITST), (336-341). Londra.
3. Bergmann, O. (2017). Eclipse tinydtls. Retrieved February 10, 2024 from Eclipse Foundation: https://projects.eclipse.org/projects/iot.tinydtls
4. Bormann, C., Ersue, M., & Keranen, A. (2014). Terminology for Constrained-Node Networks. Internet Engineering Task Force (IETF).
5. Bozkurt, Ö. (2005). Eliptik Eğri Şifreleme Kullanarak Güvenli Soket Katmanı Protokolünün Gerçeklemesi ve Performansının Değerlendirilmesi. [Yüksek Lisans Tezi]. İstanbul: Yıldız Teknik Üniversitesi Fen Bilimleri Enstitüsü, İstanbul.