[1]
“Security Vulnerabilities in IoT Protocols: A Survey and Classification”, IJITCE, vol. 4, no. 4, pp. 16–21, Dec. 2016, doi: 10.62647/.