1. Atheer Abu Zaid Manar H. Alalfi and Ali Miri. 2019. Automated Identification of Over-Privileged SmartThings Apps. In (ICSME). 247--251. Atheer Abu Zaid Manar H. Alalfi and Ali Miri. 2019. Automated Identification of Over-Privileged SmartThings Apps. In (ICSME). 247--251.
2. Mohannad Alhanahnah. 2019. Advanced Security Analysis for Emergent Software Platforms. (2019). Mohannad Alhanahnah. 2019. Advanced Security Analysis for Emergent Software Platforms. (2019).
3. Apple Last accessed : May 31 , 2021 . Apple HomeKit . https://www.apple.com/ios/home/ Apple Last accessed: May 31, 2021. Apple HomeKit. https://www.apple.com/ios/home/
4. Grzegorz J. Blinowski and Pawel Piotrowski . 2020 . CVE based classification of vulnerable IoT systems. CoRR abs/2006.16640 (2020). arXiv:2006.16640 Grzegorz J. Blinowski and Pawel Piotrowski. 2020. CVE based classification of vulnerable IoT systems. CoRR abs/2006.16640 (2020). arXiv:2006.16640
5. Taxonomy of IoT Vulnerabilities