[1]
K. Yuen, W. Shim, T. Ting, and C. Teoh, “An Insight into Current IoT Security Methods”, JTEC, vol. 10, no. 1-6, pp. 121–125, Feb. 2018.