1. Zhou, W., Jia, Y., Yao, Y., Zhu, L., Guan, L., Mao, Y., Liu, P., and Zhang, Y. (2019, January 14–16). Discovering and understanding the security hazards in the interactions between IoT devices, mobile apps, and clouds on smart home platforms. Proceedings of the 28th USENIX Conference on Security Symposium, Santa Clara, CA, USA.
2. (2021, May 02). Turning an Echo into a Spy Device Only Took Some Clever Coding. Available online: https://www.wired.com/story/amazon-echo-alexa-skill-spying.
3. A survey on access control in the age of internet of things;Qiu;IEEE Int. Things J.,2020
4. Selection of effective machine learning algorithm and Bot-IoT attacks traffic identification for internet of things in smart city;Shafiq;Future Gener. Comput. Syst.,2020
5. User and entity behavior analysis under urban big data;Tian;ACM/IMS Trans. Data Sci.,2020