1. Internet of Things Applications, Security Challenges, Attacks, Intrusion Detection, and Future Visions: A Systematic Review;Mishra;IEEE Access,2021
2. Antonakakis, M., April, T., Bailey, M., Bernhard, M., Bursztein, E., Cochran, J., Durumeric, Z., Halderman, J.A., Invernizzi, L., and Kallitsis, M. (2017, January 16–18). Understanding the Mirai Botnet. Proceedings of the 26th USENIX Security Symposium (USENIX Security 17), Vancouver, BC, Canada.
3. (2024, May 14). NJCCIC Threat Profile Satori. Available online: https://blog.netlab.360.com/warning-satori-a-new-mirai-variant-is-spreading-in-worm-style-on-port-37215-and-52869-en/.
4. Identification of malicious activities in industrial internet of things based on deep learning models;Moustafa;J. Inf. Secur. Appl.,2018
5. A Survey on Internet-of-Things Security: Threats and Emerging Countermeasures;Swessi;Wirel. Pers. Commun.,2022