1. Frahim J Pignataro C Apcar J Morrow M Securing the internet of things: A proposed framework https://www.cisco.com/c/en/us/about/security-center/secure-iot-proposed-framework.html
2. Gayer O Wilder O Zeifman I Cctv botnet in our own back yard https://www.incapsula.com/blog/cctv-ddos-botnet-back-yard.html
3. Constantin L Thousands of hacked cctv devices used in ddos attacks http://www.pcworld.com/article/3089346/security/thousands-of-hacked-cctv-devices-used-in-ddos-attacks.html
4. Cid D Large cctv botnet leveraged in ddos attacks https://blog.sucuri.net/2016/06/large-cctv-botnet-leveraged-ddos-attacks.html
5. Barnett R Irwin B Towards a taxonomy of network scanning techniques Wilderness, South Africa 2008 1 7