1. Abdel‐rahman M. Dahl G. Hinton G.(2009).Deep belief networks for phone recognition. Proceedings of the NIPS Workshop on Deep Learning for Speech Recognition and Related Applications 1–9.
2. A comprehensive IoT attacks survey based on a building‐blocked reference mode;Abdul‐Ghani H.;International Journal of Advanced Computer Science and Applications (IJACSA),2018
3. Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks
4. IoT: Architecture, challenges, and solutions using fog network and application classification;Ahmad K.;Proceedings of the 2018 International Arab Conference on Information Technology (ACIT),2019