1. IoT Analytics. (2022), State of IoT-Spring 2022. Available at: https://iot-analytics.com/product/state-of-iot-spring-2022/
2. Jurcut, A.D., Ranaweera, P. and Xu, L. (2019), "Introduction to IoT Security" in Liyanage, M., Braeken, A., Kumar, P. and Ylianttila, M. (Ed.), IoT Security: Advances in Authentication, John Wiley & Sons Ltd, pp. 27-64. Available at: http://dx.doi.org/10.1002/ ch2
3. Rak, M., Salzillo, G. and Romeo, C. (2020), "Systematic IoT Penetration Testing: Alexa Case Study", ITASEC, 2597(17). Available at: http://ceur-ws.org/Vol-2597/paper-17.pdf
4. Symantec Enterprise Blog (2019), ISTR 2019: Internet of Things Cyber Attacks Grow More Diverse. Available at: https://symantec-enterprise-blogs.security.com/blogs/expert-perspectives/istr-2019-internet-things-cyber-attacks-grow-more-diverse
5. Yadav, G., Paul, K., Allakany, A. and Okamura, K. (2020), "IoT-PEN: An E2E Penetration Testing Framework for IoT", Journal of Information Processing, 28, PP.633-642. Available at: https://doi.org/10.2197/ipsjjip.28.6336