1. A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security
2. Yousef Amar Hamed Haddadi Richard Mortier Anthony Brown James Colley and Andy Crabtree. 2018. An analysis of home iot network traffic and behaviour. arXiv preprint arXiv:1803.05368(2018). Yousef Amar Hamed Haddadi Richard Mortier Anthony Brown James Colley and Andy Crabtree. 2018. An analysis of home iot network traffic and behaviour. arXiv preprint arXiv:1803.05368(2018).
3. Noah Apthorpe , Dillon Reisman , and Nick Feamster . 2016 . Poster: A Smart Home is No Castle: Privacy Vulnerabilities of Encrypted IoT Traffic. (2016). Noah Apthorpe, Dillon Reisman, and Nick Feamster. 2016. Poster: A Smart Home is No Castle: Privacy Vulnerabilities of Encrypted IoT Traffic. (2016).
4. Sue Bennett , Karl Maton , and Lisa Kervin . 2008. The ‘digital natives ’ debate: A critical review of the evidence. British journal of educational technology 39, 5 ( 2008 ), 775–786. Sue Bennett, Karl Maton, and Lisa Kervin. 2008. The ‘digital natives’ debate: A critical review of the evidence. British journal of educational technology 39, 5 (2008), 775–786.
5. Searching the Smart Home;Bronshteyn Gabriel;Stan. L. Rev.,2020