Gante et al. [27]; Klus et al. [32]; Alhazmi et al. [33]; Guan et al. [37]
Klautau et al. [15]; Ning et al. [42]; Sadeghi et al. [43]; Shahriari et al. [39]; Yu et al. [9]; Xie et al. [51]; Li and Zhang [52]; Mismar et al. [54]; Cheng et al. [36]; Gu et al. [58]
Ozturk et al. [81]; Pang et al. [12]; Yu et al. [9]; Chen et al. [83]; Gumaei et al. [85]
Huang et al. [68]; Luo et al. [67]; Sundqvist et al. [79]; Clement et al. [71]; Kaya and Viswanathan [73]; Khan et al. [72]; Dinh et al. [59]; Zhang et al. [74]
Cyber security system
Hussain et al. [30]; Doan and Zhang [34]; Xu et al. [38]