[1] A.Thakkar, R.Lohiya, "A review on machine learning and deep learning perspectives of IDS for IoT: recent updates, security issues, and challenges." Archives of Computational Methods in Engineering 28, no.4, PP.3211-3243, 2021.
[2] Y.Shah, S.Shamik, "A survey on Classification of Cyber-attacks on IoT and IIoT devices." In 2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), PP.0406-0413, IEEE, 2020.
[3] M.V.Kamal, P.Dileep, M.Gayatri, "A Novel Approach for Providing Security for IoT Applications Using Machine Learning and Deep Learning Techniques." In Intelligent Systems and Sustainable Computing, PP.155-164, Springer, Singapore, 2022.
[4] Y.Meidan, M.Bohadana, Y.Mathov, Y.Mirsky, A.Shabtai, D.Breitenbacher, Y.Elovici. "N-baiot—network-based detection of iot botnet attacks using deep autoencoders." IEEE Pervasive Computing 17, no.3, PP.12-22, 2018.
[5] Shah, Zawar, I.Ullah, H.Li, A.Levula, K.Khurshid, "Blockchain Based Solutions to Mitigate Distributed Denial of Service (DDoS) Attacks in the Internet of Things (IoT): A Survey." Sensors 22, no. 3, P.1094, 2022.
[6] M.Mudassir, D.Unal, M.Hammoudeh, F.Azzedin. "Detection of Botnet Attacks against Industrial IoT Systems by Multilayer Deep Learning Approaches." Wireless Communications and Mobile Computing, 2022.
[7] M.A.Khan, K.Salah, "IoT security: Review, blockchain solutions, and open challenges." Future generation computer systems 82, PP.395-411, 2018.
[8] F.Zhu, W.Wu, Y.Zhang, and X.Chen, "Privacy-preserving authentication for general directed graphs in industrial IoT." Information sciences 502, PP.218-228, 2019.
[9]C.Perera, M.Barhamgi, A.K.Bandara, M.Ajmal, B.Price, B.Nuseibeh, "Designing privacy-aware internet of things applications." Information Sciences 512, PP.238-257, 2020.
[10] B.P.Poudel, A.Mustafa, A.Bidram, H.Modares, "Detection and mitigation of cyber-threats in the DC microgrid distributed control system." International Journal of Electrical Power & Energy Systems 120, P.105968, 2020.
[11] M.Vasou Jouybari, E.Ataie, M.Bastam, “An MLP-based Deep Learning Approach for Detecting DDoS Attacks”, Tabriz Journal of Electrical Engineering (TJEE), vol.52, no.3, PP.195-204, 2022.
[12] G.D.L.T.Parra, P.Rad, K.K.R.Choo, N.Beebe, "Detecting Internet of Things attacks using distributed deep learning." Journal of Network and Computer Applications 163, P.102662, 2020.
[13] A.Al Shorman, H.Faris, I.Aljarah, "Unsupervised intelligent system based on one class support vector machine and Grey Wolf optimization for IoT botnet detection." Journal of Ambient Intelligence and Humanized Computing 11, no. 7, PP.2809-2825, 2020.
[14] S.Hosseini, B.M.Hasani Zade. "New hybrid method for attack detection using combination of evolutionary algorithms, SVM, and ANN." Computer Networks 173, P.107168, 2020
[15] محمدهادی قومنجانی، جواد حمیدزاده، "دستهبند تک کلاسه مبتنی بر بردارهای پشتیبان برای دادههای نویزی با استفاده از الگوریتم گروه میگوی آشوبی و تراکم محلی"، مجله مهندسی برق دانشگاه تبریز، جلد 48، شماره 3، صفحات 1325-1315، 1397.
[16] X.Kan, Y.Fan, Z.Fang, L.Cao, Neal N. Xiong, D.Yang, X.Li, "A novel IoT network intrusion detection approach based on adaptive particle swarm optimization convolutional neural network." Information Sciences 568, PP.147-162, 2021.