[1]
A.G. Menjivar, "Mobile App Development for Wireless Monitoring and Configuration of Sensors using ESP8266," in 2022 IEEE Central America and Panama Student Conference (CONESCAPAN), San Salvador, El Salvador: IEEE, Oct. 2022, p.1–6.
DOI: 10.1109/CONESCAPAN56456.2022.9959569
Google Scholar
[2]
"Development of a Pure Sine Wave Current Inverter with IoT Monitoring | IEEE Conference Publication | IEEE Xplore." Accessed: Jan. 23, 2024. [Online]. Available: https://ieeexplore.ieee.org/document/9959240
Google Scholar
[3]
M. H. Alsharif, A. Jahid, A. H. Kelechi, and R. Kannadasan, "Green IoT: A Review and Future Research Directions," Symmetry, vol. 15, no. 3, Art. no. 3, Mar. 2023
DOI: 10.3390/sym15030757
Google Scholar
[4]
L. Tawalbeh, F. Muheidat, M. Tawalbeh, and M. Quwaider, "IoT Privacy and Security: Challenges and Solutions," Appl. Sci., vol. 10, no. 12, Art. no. 12, Jan. 2020.
DOI: 10.3390/app10124102
Google Scholar
[5]
W. Iqbal, H. Abbas, M. Daneshmand, B. Rauf, and Y. A. Bangash, "An In-Depth Analysis of IoT Security Requirements, Challenges, and Their Countermeasures via SoftwareDefined Security," IEEE Internet Things J., vol. 7, no. 10, p.10250–10276, Oct. 2020.
DOI: 10.1109/JIOT.2020.2997651
Google Scholar
[6]
T. Varshney, N. Sharma, I. Kaushik, and B. Bhushan, "Architectural Model of Security Threats theirCountermeasures in IoT," in 2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS), Greater Noida, India: IEEE, Oct. 2019, p.424–429
DOI: 10.1109/ICCCIS48478.2019.8974544
Google Scholar
[7]
C. Wang and Z. Lu, "Cyber Deception: Overview and the Road Ahead," IEEE Secur. Priv., vol. 16, no. 2, p.80–85, Mar. 2018.
DOI: 10.1109/MSP.2018.1870866
Google Scholar
[8]
D. Weissman, "IoT Security Using Deception – Measuring Improved Risk Posture," in 2020 IEEE 6th World Forum on Internet of Things (WF-IoT), Jun. 2020, p.1–2.
DOI: 10.1109/wf-iot48130.2020.9221223
Google Scholar
[9]
H. Galadima, A. Seeam, and V. Ramsurrun, "Cyber Deception against DDoS attack using Moving Target Defence Framework in SDN IOT-EDGE Networks," in 2022 3rd International Conference on Next Generation Computing Applications (NextComp), Oct. 2022, p.1–6.
DOI: 10.1109/NextComp55567.2022.9932172
Google Scholar
[10]
M. S. Pour, J. Khoury, and E. Bou-Harb, "HoneyComb: A Darknet-Centric Proactive Deception Technique for Curating IoT Malware Forensic Artifacts," in NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium, Apr. 2022, p.1–9.
DOI: 10.1109/NOMS54207.2022.9789827
Google Scholar
[11]
"Securing IoT Devices and SecurelyConnecting the Dots Using REST API and Middleware.pdf."
Google Scholar
[12]
"Design of Restaurant Billing System (E Bill Resto) by Applying Synchronization of Data Billing in Branch Companies to Main Companies Based on Rest API | IEEE Conference Publication | IEEE Xplore."
DOI: 10.1109/icosta48221.2020.1570615039
Google Scholar
[13]
K. Košťál, P. Helebrandt, M. Belluš, M. Ries, and I. Kotuliak, "Management and Monitoring of IoT Devices Using Blockchain," Sensors, vol. 19, no. 4, Art. no. 4, Jan. 2019.
DOI: 10.3390/s19040856
Google Scholar
[14]
"IoT Security Enhancement Using Blockchain | IEEE Conference Publication | IEEE Xplore." Accessed: Jan. 28, 2024. [Online]. Available: https://ieeexplore.ieee.org/document/9792693
Google Scholar
[15]
R. Patel, Cyber Security in Domain of IoT: A Review Threats and Security. 2020.
Google Scholar
[16]
] Y. N. Soe, Y. Feng, P. I. Santosa, R. Hartanto, and K. Sakurai, "Machine Learning-Based IoTBotnet Attack Detection with Sequential Architecture," Sensors, vol. 20, no. 16, Art. no. 16, Jan. 2020.
DOI: 10.3390/s20164372
Google Scholar
[17]
"IoT Botnet Creation and Detection using Machine Learning | IEEE Conference Publication | IEEE Xplore." Accessed: Jan. 28, 2024. [Online]. Available: https://ieeexplore.ieee.org/document/10141717
Google Scholar
[18]
"Timely Detection and Mitigation of Stealthy DDoS Attacks Via IoT Networks | IEEE Journals Magazine|IEEE Xplore." Accessed: Jan. 29, 2024. [Online]. Available: https://ieeexplore.ieee.org/abstract/document/9316792
Google Scholar
[19]
"Learning-Driven Detection and Mitigation of DDoS Attack in IoT via SDN-Cloud Architecture | IEEE Journals Magazine | IEEE Xplore." Accessed: Jan. 29, 2024. [Online]. Available: https://ieeexplore.ieee.org/abstract/document/8993716
DOI: 10.1109/jiot.2020.2973176
Google Scholar
[20]
M. A. Lawal, R. A. Shaikh, and S. R. Hassan, "An Anomaly Mitigation Framework for IoT Using Fog Computing," Electronics, vol. 9, no. 10, Art. no. 10, Oct. 2020.
DOI: 10.3390/electronics9101565
Google Scholar