[1] |
Park M., Han J., Oh H.and Lee, K., 2019. Threat assessment for android environment with connectivity to IoT devices from the perspective of situational awareness. Wireless Communications and Mobile Computing, 2019(1), p. 5121054.
|
[2] |
Ngo Q.D., Nguyen H.T., Le V.H. and Nguyen D.H., 2020. A survey of IoT malware and detection methods based on static features. ICT express, 6(4), pp. 280-286.
|
[3] |
Gartner, Gartner Says Global Government IoT Revenue for Endpoint Electronics and Communications to Total $ 21 Billion in 2022, .
|
[4] |
Alghazzawi D., Wazzan M., Algazzawi D., Bamasaq O., Albeshri A., Cheng L. and Bamasag O., 2021. Internet of Things Botnet Detection Approaches: Analysis and Recommendations for Future Research: Analysis and recommendations for future research. Applied Sciences, 11(12), p. 5713.
|
[5] |
Trend Micro, IoT Botnet, , accessed on October 1, 2024.
|
[6] |
Franklin C.,7 Malware Families Ready to Ruin Your IoT's Day, , accessed on October 1, 2024.
|
[7] |
Trajanovski T. and Zhang N., 2021. IoT-BDA Botnet Analysis Dataset, IEEE Dataport.
|
[8] |
Cumming G. J., Inside Shellshock: How hackers are using it to exploit systems, , accessed on October 1, 2024.
|
[9] |
Okta, Bad Packets, , accessed on October 1, 2024.
|
[10] |
VirusTotal, , accessed on October 1, 2024.
|
[11] |
Sikos L.F., 2020. Packet analysis for network forensics: A comprehensive survey. Forensic Science International: Digital Investigation, 32, p. 200892.
|
[12] |
Wireshark, , accessed on October 1, 2024.
|
[13] |
A-Packets, A-Packets: Unleash the Power of PCAP Analysis, , accessed on October 1, 2024.
|
[14] |
Faust K., 2006. Comparing social networks: size, density, and local structure. Metodoloski zvezki, 3(2), p. 185.
|
[15] |
Sardana N. and Jadhav Bhatt A., 2021, August. Detection of ios malware apps based on significant services identification using borda count. In Proceedings of the 2021 Thirteenth International Conference on Contemporary Computing (pp. 86-91).
|