1.
Atzori, Luigi, Antonio Iera, and Giacomo Morabito. "The internet of things: A survey." Computer networks 54.15 (2010): 2787-2805
2.
Hassan, Basma Mostafa. Monitoring the Internet of Things (IoT) Networks. Diss. Université Montpellier; Gami at al-Qahirat, 2019.
3.
Alaba, Fadele Ayotunde, et al. "Internet of Things security: A survey." Journal of Network and Computer Applications 88 (2017): 10-28.
4.
Mendez, Diego M., Ioannis Papapanagiotou, and Baijian Yang. "Internet of things: Survey on security and privacy." arXiv preprint arXiv:1707.01879 (2017).
5.
Deogirikar, Jyoti, and Amarsinh Vidhate. "Security attacks in IoT: A survey." 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC). IEEE, 2017.
6.
Choudhary, Sarika and Nishtha Kesswani. "A Survey: Intrusion Detection Techniques for Internet of Things." IJISP vol.13, no.1 2019: pp.86-105. http://doi.org/10.4018/IJISP.2019010107
7.
Ahmed, Hassan I., et al. "A survey of IoT security threats and defenses." International Journal of Advanced Computer Research 9.45 (2019): 325-350.
8.
Dvir, Amit, and Levente Buttyan. "VeRA-version number and rank authentication in RPL." 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems. IEEE, 2011.
9.
Raza, Shahid, Linus Wallgren, and Thiemo Voigt. "SVELTE: Real-time intrusion detection in the Internet of Things." Ad hoc networks 11.8 (2013): 2661-2674.
10.
Zaminkar, Mina, and Reza Fotohi. "SoS-RPL: securing internet of things against sinkhole attack using RPL protocol-based node rating and ranking mechanism." arXiv preprint arXiv:2005.09140 (2020).
11.
Cervantes, Christian, et al. "Detection of sinkhole attacks for supporting secure routing on 6LoWPAN for Internet of Things." 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM). IEEE, 2015.
12.
Karlof, Chris, and David Wagner. "Secure routing in wireless sensor networks: Attacks and countermeasures." Ad hoc networks 1.2-3 (2003): 293-315.
13.
Wallgren, Linus, Shahid Raza, and Thiemo Voigt. "Routing attacks and countermeasures in the RPL-based internet of things." International Journal of Distributed Sensor Networks 9.8 (2013): 794326.
14.
Chawla, Shiven. Deep learning based intrusion detection system for the Internet of Things. University of Washington, 2017.
15.
S., Gayathri K. and Tony Thomas. "Intrusion Detection Systems for Internet of Things." Handbook of Research on Intrusion Detection Systems, edited by Brij B. Gupta and Srivathsan Srinivasagopalan, IGI Global, 2020, pp. 148-171. http://doi:10.4018/978-1-7998-2242-4.ch008
16.
Bace, Rebecca Gurley, and Peter Mell. "Intrusion detection systems." (2001): 201.
17.
Smys, S., Abul Basar, and Haoxiang Wang. "Hybrid intrusion detection system for internet of things (IoT)." Journal of ISMAC 2.04 (2020): 190-199.
18.
Zarpelão, Bruno Bogaz, et al. "A survey of intrusion detection in Internet of Things." Journal of Network and Computer Applications 84 (2017): 25-37.
19.
Faraj, Omair, et al. "Taxonomy and challenges in machine learning-based approaches to detect attacks in the internet of things." Proceedings of the 15th International Conference on Availability, Reliability, and Security. 2020.
20.
Al-Ajlan, Ajlan. "The comparison between forward and backward chaining." International Journal of Machine Learning and Computing 5.2 (2015): 106.
21.
Mzori, Bareen Haval Sadiq. Forward and Backward Chaining Techniques of Reasoning in Rule-Based Systems. MS thesis. Eastern Mediterranean University (EMU)-Do?u Akdeniz Üniversitesi (DAÜ), 2015.
22.
Lodder, Arno R., and John Zeleznikow. "Artificial intelligence and online dispute resolution." Online Dispute Resolution: Theory and Practice A Treatise on Technology and Dispute Resolution (2012): 73-94.
23.
Winston, Patrick Henry, and Richard Henry Brown. "Artificial intelligence: an MIT perspective." Cambridge, Mass (1979): 1.
24.
B. George and S. S. Mathai, "Improving quality of interference in multilevel secure knowledge-based systems," 2004 International Conference on Machine Learning and Applications, 2004. Proceedings., 2004, pp. 477-484, doi: 10.1109/ICMLA.2004.1383553.