Mena, D. M., Papapanagiotou, I. and Yang, B. (2018) Internet of things: Survey on security. Information Security Journal: A Global Perspective, 27:3, 162-182, DOI: 10.1080/19393555.2018.1458258
Oorschot, P. C and Smoth, S. W. (2019). The Internet of Things: Security Challenges. IEEE Security and Privacy Magazine, 17(5):7-9. DOI: 10.1109/MSEC.2019.2925918
Viriat, M. S. et al. (2018). Security and Privacy Challenges in Internet ofn Things. Proceedings of the 2nd International Conference on Trends in Electronics and Informatics. IEEE Conference Record: # 42666; IEEE Xplore ISBN:978-1-5386-3570-4
Analytics Vidhya (August 26, 2016). 10 Real World Applications of Internet of Things (IoT) – Explained in Videos. Retrievd from https://www.analyticsvidhya.com/blog/2016/08/10-youtube-videos-explaining-the-real-world-applications-of-internet-of-things-iot/
Clark, J. (November 17, 2016). What is the Internet of Things (IoT)? Retrieved from https://www.ibm.com/blogs/internet-of-things/what-is-the-iot/
Evans, D. (2011). The internet of things how the next evolution of the internet is changing everything. Cisco White Paper, 1–11. Retrieved from
https://www.cisco.com/c/dam/en_us/about/ac79/docs/innov/IoT_IBSG_0411FINAL.pdf
Griffiths, J. (February 2, 2019). ‘Internet of things’ or ‘vulnerability of everything’? Japan will hack its own citizens to find out. Retrived from https://edition.cnn.com/2019/02/01/asia/japan-hacking-cybersecurity-iot-intl
Kelbert, J. (September 24, 2019). 5 Interesting Facts About the IoT. Retrieved from https://blog.flexis.com/5-interesting-facts-about-the-internet-of-things-iot
Mena, D. M., Papapanagiotou, I. and Yang, B. (2018) Internet of things: Survey on security. Information Security Journal: A Global Perspective, 27:3, 162-182, DOI: 10.1080/19393555.2018.1458258
Finance Monthly (September 5, 2019). The Worst And Weirdest IoT Hacks Of All Times. Retrived from https://www.finance-monthly.com/2019/09/the-worst-and-weirdest-iot-hacks-of-all-times/
Ngo, D. (December 22, 2015). Home networking explained, part 9: Access your home computer remotely. Retrieved from https://www.cnet.com/how-to/home-networking-explained-part-9-access-your-home-computer-remotely/
Oorschot, P. C and Smoth, S. W. (2019). The Internet of Things: Security Challenges. IEEE Security and Privacy Magazine, 17(5):7-9. DOI: 10.1109/MSEC.2019.2925918
Spencer, T. (August 8, 2019). How to Respond to a Cyber Attack. Retrived from https://www.industryweek.com/sponsored/article/22028042/how-to-respond-to-a-cyber-attack
Viriat, M. S. et al. (2018). Security and Privacy Challenges in Internet ofn Things. Proceedings of the 2nd International Conference on Trends in Electronics and Informatics. IEEE Conference Record: # 42666; IEEE Xplore ISBN:978-1-5386-3570-4