Computer and Communications, 11, 26-42.
https://doi.org/10.4236/jcc.2023.111003
Ankit Dhatrak, Anshuman Sarkar; ”Cyber Security Threats
and Vulnerabilities in IoT” IRJET;Volume: 07 Issue:
03 — Mar 2020.
N. Mishra and S. Pandya, ”Internet of Things Applications,
Security Challenges, At-tacks, Intrusion Detection and
Future Visions: A Systematic Review,” in IEEE
Access, vol. 9, pp. 59353-59377, 2021, doi:
10.1109/ACCESS.2021.3073408.
https://content.altexsoft.com/media/2020/08/iot-
architecture-buildingblocks.png.webp
Khan, Muhammad Almas Khattak, Muazzam Jan, Sana
Ullah Ahmad, Jawad Jamal, Sajjad Shaukat Shah,
Awais Pitropakis, Nikolaos Buchanan, William.
(2021). A Deep Learning-Based Intrusion Detection
System for MQTT Enabled IoT. Sensors. 21.
10.3390/s21217016.
Y. al-Hadharni and F. K. Hussain, “DDoS attacks in IoT
networks: A comprehensive systematic literature
review,” World Wide Web,Jan. 2021. 61
K. Doshi, Y. Yilmaz and S. Uludag, “Timely detection and
mitigation of stealthy DDoS attacks via IoT networks,”
IEEE Trans. Dependable Secure Comput., early access,
Jan. 8, 2021, doi: 10.1109/TDSC.2021.3049942.
S. E. Belanda, C. F. M. Foozy, A. Mustapha, P. S. S.
Palaniapan and Z. Abdullah, “De-tecting botnet attack
in Internet of Things (IoTs) environment by using
machine learn-ing technique: A review,” J. Crit. Rev.,
vol. 7, no. 8, 2020.
H. Wu, H. Han, X. Wang and S. Sun, “Research on artificial
intelligence enhancing In-ternet of Things security: A
survey,” IEEE Access, vol. 8, 2020.
A. Munshi, N. A. Alqarni and N. A. Almalki, “DDOS attack
on IoT devices,” in Proc. 3rd Int. Conf. Comput. Appl.
Inf. Secur. (ICCAIS), Mar. 2020,
C. V. Mart´ınez and B. Vogel-Heuser, “Towards industrial
intrusion prevention sys-tems: A concept and
implementation for reactive protection,” Appl. Sci., vol.
8, no. 12,2018.
R. Panigrahi, S. Borah, A. K. Bhoi and P. K. Mallick,
“Intrusion detection systems (IDS)—An overview with
a generalized framework,” Adv. Intell. Syst. Comput.,
vol. 1040
F. Meneghello, M. Calore, D. Zucchetto, M. Polese and A.
Zanella, “IoT: Internet of threats? A survey of practical
security vulnerabilities in real IoT devices,” IEEE
Internet Things J., vol. 6, no. 5, Oct. 2019.
P. Anand, Y. Singh, A. Selwal, M. Alazab, S. Tanwar and
N. Kumar, “IoT vulnerability assessment for
sustainable computing: Threats, current solutions and
open challenges,” IEEE Access, vol. 8, 2020.
Q.-D. Ngo, H.-T. Nguyen, L.-C. Nguyen and D.-H.
Nguyen, “A survey of IoT malware and detection
methods based on static features,” Opt. Commun.,
2020.
Carratù, M., Colace, F., Lorusso, A., Pietrosanto, A.,
Santaniello, D., Valentino, C. (2023). Data Mining
Techniques for Intrusion Detection on the Internet of
Things Field. International Conference on Cyber
Security, Privacy and Networking (ICSPN 2022).
ICSPN 2021Springer, Cham.
https://doi.org/10.1007/978-3-031-22018-0_1
Ling, Z., Hao, Z.J.: Intrusion detection using normalized
mutual information feature se-lection and parallel
quantum genetic algorithm. Int. J. Semant. Web Inf.
Syst. (IJSWIS) 18(1), 1-24 (2022).
Zarpelão, B.B., Miani, R.S., Kawakani, C.T., de Alvarenga,
S.C.: A survey of intrusion detection in internet of
things. J. Netw. Comput. Appl. 84 (2017).
https://doi.org/10.1016/j.jnca.2017.02.009.
ARNAR PÉTURSSON, Ethical Hacking of a Ring
Doorbell, https://www.diva-
portal.org/smash/get/diva2:1751192/FULLTEXT01.p
df
Xu, Yuan & Han, Xingshuo & Deng, Gelei & Li, Guanlin
& Liu, Yang & Li, Jiwei & Zhang, Tianwei. (2022).
SoK: Rethinking Sensor Spoofing Attacks against
Robotic Ve-hicles from a Systematic View.
Verkada Security Incident Report :
https://docs.verkada.com/docs/Security_Incident_Rep
ort_Version1.2.pdf
Vakhshiteh, Fatemeh & Nickabadi, Ahmad &
Ramachandra, Raghavendra. (2021). Adversarial
Attacks Against Face Recognition: A Comprehensive
Study. IEEE Access. PP. 1-1.
10.1109/ACCESS.2021.3092646.
Peloton's API exposes riders' private data.
https://www.securitymagazine.com/articles/95146-
pelotons-api-exposes-riders-private-data.