1. King J. and Awad A.I. , A distributed security mechanism for resource-constrained IoT devices, Informatica 40(1), 2016.
2. Gendreau A.A. and Moorman M. , Survey of intrusion detection systems towards an end to end secure internet of things, in 2016 IEEE 4th international conference on future internet of things and cloud (FiCloud). IEEE, (2016), pp. 84–90.
3. Intrusion detection systems for iot-based smart environments: a survey;Elrawy;Journal of Cloud Computing,2018
4. Alkasassbeh M. and Almseidin M. , Machine learning methods for network intrusion detection, in 2018 - the 20th international conference on computing, communication and networking technologies ICCCNT, (2018), pp. 84–90.
5. Fuzzy rule interpolation and snmp-mib for emerging network abnormality;Almseidin;International Journal on Advanced Science, Engineering and Information Technology,2019