[1]
K. Yuen, W. Shim, T. Ting, and C. Teoh, “An Insight into Current IoT Security Methods”,
JTEC
, vol. 10, no. 1-6, pp. 121–125, Feb. 2018.