References
Akashdeep, Bhardwaj. (2024). Smart Home and Industrial IoT Devices: Critical Perspectives on Cyberthreats, Frameworks and Protocols. doi: 10.2174/97898152567101240101 Ashawa, M., & Morris, S. (2021). Analysis of Mobile Malware: A Systematic Review of Evolution and Infection Strategies. Journal of Information Security and Cybercrimes Research, 4(2), 103–131. Azis, B., Ong, A. K. S., Prasetyo, Y. T., Persada, S. F., Young, M. N., Sari, Y. K. P., & Nadlifatin, R. (2023). IoT human needs inside compact house. Journal of Open Innovation: Technology, Market, and Complexity, 9(1), 1-9 Benaroch, Michel. (2021). Third-party induced cyber incidents—much ado about nothing?. Journal of Cybersecurity. 7. 10.1093/cybsec/tyab020. Bugeja, J., Jacobsson, A., & Davidsson, P. (2018). Smart connected homes. Internet of things A to Z: Technologies and applications, 359-384. Kounoudes, A. D., & Kapitsaki, G. M. (2020). A mapping of IoT user-centric privacy-preserving approaches to the GDPR. Internet of Things, 11, https://doi.org/10.1016/j.iot.2020.100179 Nkenyereye, L., Hwang, J., Pham, Q. V., & Song, J. (2021). Virtual IoT service slice functions for multiaccess edge computing platform. IEEE Internet of Things Journal, 8(14), 11233- Omar, Alshamsi., Khaled, Shaalan., Usman, Javed, Butt. (2024). Towards Securing Smart Homes: A Systematic Literature Review of Malware Detection Techniques and Recommended Prevention Approach. Information, 15(10):631-631. doi: 10.3390/ info15100631 Prabakaran, M. K., Meenakshi Sundaram, P., & Chandrasekar, A. D. (2023). An enhanced deep learning?based phishing detection mechanism to effectively identify malicious URLs using variational autoencoders. IET Information Security, 17(3), 423-440 Sebastian Garcia, Agustin Parmisano, & Maria Jose Erquiaga. (2020). IoT-23: A labeled dataset with malicious and benign IoT network traffic (Version 1.0.0) [Data set]. Zenodo. http://doi.org/10.5281/zenodo.4743746 Shobana, M., & Rathi, S. (2018). Iot malware: An analysis of iot device hijacking. International Journal of Scientific Research in Computer Science, Computer Engineering, and Information Technology, 3(5), 2456-3307 Song, M. (2023, September 15). Understanding the Confusion Matrix Without Confusion. Medium. https://medium.com/@msong507/understanding-the-confusion-matrix-without confusion-126b25dd773c Vadigi, S., Sethi, K., Mohanty, D., Das, S. P., & Bera, P. (2023). Federated reinforcement learning- based intrusion detection system using dynamic attention mechanism. Journal of Information Security and Applications, 78, https://doi.org/10.1016/j.jisa.2023.103608 Zrelli, A. (2022). Hardware, software platforms, operating systems and routing protocols for Internet of Things applications. Wireless Personal Communications, 122(4), 3889-3912