1. 2018. IOT DEVELOPER SURVEY RESULTS. https://iot.eclipse.org/community/resources/iot-surveys/assets/iot-developer-survey-2018.pdf 2018. IOT DEVELOPER SURVEY RESULTS. https://iot.eclipse.org/community/resources/iot-surveys/assets/iot-developer-survey-2018.pdf
2. Investigating Messaging Protocols for the Internet of Things (IoT)
3. Security analysis of the constrained application protocol in the Internet of Things
4. T Alsbouí , Mohammad Hammoudeh , Zuhair Bandar , and Andy Nisbet . 2011 . An overview and classification of approaches to information extraction in wireless sensor networks . In Proceedings of the 5th International Conference on Sensor Technologies and Applications (SENSORCOMM’11) , Vol. 255. T Alsbouí, Mohammad Hammoudeh, Zuhair Bandar, and Andy Nisbet. 2011. An overview and classification of approaches to information extraction in wireless sensor networks. In Proceedings of the 5th International Conference on Sensor Technologies and Applications (SENSORCOMM’11), Vol. 255.
5. Enforcing security in Internet of Things frameworks: A Systematic Literature Review