[1] Atzori L, Iera A, Morabito G. The internet of things: A survey. Computer Networks. 2010 Oct 28;54(15):2787-805.
[2] Gubbi J, Buyya R, Marusic S, Palaniswami M. Internet of Things (IoT): A vision, architectural elements, and future directions. Future Generation Computer Systems. 2013 Sep 1;29(7):1645-60.
[3] Statista Research Department. Number of connected IoT devices worldwide 2020-2030 [Internet]. New York: Statista; 2025 [cited 2026 Apr 25]. Available from: https://www.statista.com/statistics/1183457/iot-connected-devices-worldwide/
[4] Alaba FA, Othman M, Hashem IAT, Alotaibi F. Internet of Things security: A survey. Journal of Network and Computer Applications. 2017 Jun 1;88:10-28.
[5] Zhou W, Jia Y, Peng A, Zhang Y, Liu P. The effect of IoT new features on security and privacy: New threats, existing solutions, and challenges yet to be solved. IEEE Internet of Things Journal. 2018 Nov 1;6(2):1606-16.
[6] Trappe W, Howard R, Moore RS. Low-energy security: Limits and opportunities in the internet of things. IEEE Security & Privacy. 2015 Jan 22;13(1):14-21.
[7] Sicari S, Rizzardi A, Grieco LA, Coen-Porisini A. Security, privacy and trust in Internet of Things: The road ahead. Computer Networks. 2015 Jan 15;76:146-64.
[8] Makhdoom I, Abolhasan M, Lipman J, Liu RP, Ni W. Anatomy of threats to the internet of things. IEEE Communications Surveys & Tutorials. 2018 Jul 16;21(2):1636-75.
[9] Bertino E, Islam N. Botnets and internet of things security. Computer. 2017 Feb 21;50(2):76-9.
[10] Kolias C, Kambourakis G, Stavrou A, Voas J. DDoS in the IoT: Mirai and other botnets. Computer. 2017 Jul 6;50(7):80-4.
[11] Antonakakis M, April T, Bailey M, Bernhard M, Bursztein E, Cochran J, et al. Understanding the mirai botnet. In: 26th USENIX Security Symposium (USENIX Security 17); 2017 Aug 16-18; Vancouver, BC. p. 1093-110.
[12] Andy S, Rahardjo B, Hanindhito B. Attack scenarios and security analysis of MQTT communication protocol in IoT system. In: 2017 4th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI); 2017 Sep 19-21; Yogyakarta, Indonesia. IEEE; 2017. p. 1-6.
[13] Chen Y, Zhang Y, Wang S. Vulnerability assessment and mitigation for IoT firmware: A survey. Computers & Security. 2024 Mar 1;138:103674.
[14] Ziegeldorf JH, Morchon OG, Wehrle K. Privacy in the Internet of Things: threats and challenges. Security and Communication Networks. 2014 Dec;7(12):2728-42.
[15] Mohanty SN, Ramya KC, Rani SS, Gupta D, Shankar K, Lakshmanaprabu SK, Khanna A. An efficient lightweight integrated blockchain (ELIB) model for IoT security and privacy. Future Generation Computer Systems. 2020 Jan 1;102:1027-37.
[16] HaddadPajouh H, Dehghantanha A, Khayami R, Choo KKR. A deep recurrent neural network based approach for internet of things malware threat hunting. Future Generation Computer Systems. 2018 Aug 1;85:88-96.
[17] Mousavi SK, Ghaffari A, Besharat S, Afshari H. Security of internet of things using RC4 and LFSR lightweight hybrid algorithm (RLHA). Wireless Personal Communications. 2020 Dec;115(4):2953-67.
[18] McKay KA, Bassham LE, Sonmez Turan M, Mouha N. Report on lightweight cryptography (NIST IR 8114). Gaithersburg (MD): National Institute of Standards and Technology; 2017 Apr. 34 p.
[19] Dwivedi AD, Srivastava G, Dhar S, Singh R. A decentralized privacy-preserving healthcare blockchain for IoT. Sensors. 2019 Jan 18;19(2):326.
[20] Sivanathan A, Sherratt D, Gharakheili HH, Sivaraman V, Vishwanath A. Low-cost flow-based security for home IoT networks. In: 2019 IEEE 44th Conference on Local Computer Networks (LCN); 2019 Oct 14-17; Osnabrück, Germany. IEEE; 2019. p. 360-7.
[21] Sivanathan A, Gharakheili HH, Sivaraman V. Managing IoT cyber-security using programmable telemetry and data plane filtering. In: 2020 IEEE 28th International Conference on Network Protocols (ICNP); 2020 Oct 13-16; Madrid, Spain. IEEE; 2020. p. 1-6.
[22] Al-Garadi MA, Mohamed A, Al-Ali AK, Du X, Ali I, Guizani M. A survey of machine and deep learning methods for internet of things (IoT) security. IEEE Communications Surveys & Tutorials. 2020 Apr 3;22(3):1646-85.
[23] Hasan M, Islam MM, Zarif MII, Hashem MMA. Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches. Internet of Things. 2019 Sep 1;7:100059.
[24] Anthi E, Williams L, Słowińska M, Theodorakopoulos G, Burnap P. A supervised intrusion detection system for smart home IoT devices. IEEE Internet of Things Journal. 2019 May 23;6(5):9042-53.
[25] Diro AA, Chilamkurti N. Distributed attack detection scheme using deep learning approach for Internet of Things. Future Generation Computer Systems. 2018 May 1;82:761-8.
[26] Ullah I, Mahmoud QH. A two-level flow-based anomalous activity detection system for IoT networks using deep learning. Journal of Network and Systems Management. 2021 Apr;29(2):1-27.
[27] Khan MA, Khan MA, Jan SU, Ahmad J, Jamal SS, Shah AA, Pitropakis N, Buchanan WJ. A deep learning-based intrusion detection system for MQTT enabled IoT. Sensors. 2021 Oct 18;21(20):7016.
[28] Roopak M, Tian GY, Chambers J. Deep learning models for cyber security in IoT networks. In: 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC); 2019 Jan 7-9; Las Vegas, NV, USA. IEEE; 2019. p. 452-7.
[29] Ferrag MA, Maglaras L, Moschoyiannis S, Janicke H. Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study. Journal of Information Security and Applications. 2020 Feb 1;50:102419.
[30] Moustafa N, Slay J. UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: 2015 Military Communications and Information Systems Conference (MilCIS); 2015 Nov 10-12; Canberra, ACT, Australia. IEEE; 2015. p. 1-6.
[31] Sharafaldin I, Lashkari AH, Ghorbani AA. Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: Proceedings of the 4th International Conference on Information Systems Security and Privacy (ICISSP 2018); 2018 Jan 22-24; Funchal, Portugal. p. 108-16.
[32] Koroniotis N, Moustafa N, Sitnikova E, Turnbull B. Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT dataset. Future Generation Computer Systems. 2019 Nov 1;100:779-96.