K. Fu, T. Kohno, D. Lopresti, E. Mynatt, K. Nahrstedt et al., Security, and Privacy Threats Posed by Accelerating Trends in the Internet of Things, 2017.

O. Brun, Y. Yin, J. Augusto-gonzalez, M. Ramos, and E. Gelenbe, IoT Attack Detection with Deep Learning, ISCIS Security Workshop, 2018.

O. Brun, Y. Yin, and E. Gelenbe, Deep Learning with Dense Random Neural Network for Detecting Attacks against IoTconnected Home Environments, Procedia Computer Science, vol.134, pp.458-463, 2018.
URL : https://hal.archives-ouvertes.fr/hal-02062117

E. Skoudis and T. Liston, Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses, 2005.

A. Dubey, V. Jain, and A. Kumar, A survey in energy drain attacks and their countermeasures in wireless sensor networks, Int. J. Eng. Res. Technol, vol.3, issue.2, 2014.

F. Francois, O. H. Abdelrahman, and E. Gelenbe, Impact of signaling storms on energy consumption and latency of lte user equipment, IEEE 7th Int. Symp. on Cyberspace Safety and Security, pp.1248-1255, 2015.

E. Gelenbe and Y. Murat-kadioglu, Energy life-time of wireless nodes with and without energy harvesting under network attacks, IEEE Int. Conf. on Communications (ICC), pp.20-24, 2018.

E. Y. Vasserman and N. Hopper, Vampire attacks: Draining life from wireless ad hoc sensor networks, IEEE Trans. Mobile Computing, vol.12, issue.2, pp.318-332, 2013.

M. Pirretti, S. Zhu, N. Vijaykrishnan, P. Mcdaniel, M. Kandemir et al., The sleep deprivation attack in sensor networks: Analysis and methods of defense, Int. Journal of Distributed Sensor Networks, vol.2, issue.3, pp.267-287, 2006.

X. Lu, M. Spear, K. Levitt, N. S. Matloff, and S. F. Wu, A synchronization attack and defense in energy-efficient listen-sleep slotted mac protocols, 2nd Int. Conf. on Emerging Security Information, Systems and Technologies, 2008.

A. Mauro, X. Fafoutis, S. Mödersheim, and N. Dragoni, Detecting and Preventing Beacon Replay Attacks in Receiver-Initiated MAC Protocols for Energy Efficient WSNs, pp.1-16, 2013.

M. Brownfield, Y. Gupta, and N. Davis, Wireless sensor network denial of sleep attack, Proc. 2005 IEEE workshop on information assurance and security, 2005.

Y. W. Law, M. Palaniswami, L. Van-hoesel, J. Doumen, P. Hartel et al., Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols, ACM Trans. Sen. Netw, vol.5, issue.1, p.38, 2009.

R. Rehim, Python Penetration Testing Cookbook Packt Publishing, 2017.

E. Gelenbe, Learning in the recurrent random neural network, Neural Computation, vol.5, issue.1, pp.154-164, 1993.

E. Gelenbe, Random neural networks with negative and positive signals and product form solution, Neural Computation, vol.1, issue.4, pp.502-510, 1989.

E. Gelenbe and Y. Yin, Deep learning with random neural networks. Neural Networks (IJCNN), 2016 Int. Joint Conference on, pp.1633-1638, 2016.

E. Gelenbe and Y. Yin, Deep Learning with Dense Random Neural Networks, Proc. Int. Conf. on Man-Machine Interactions, pp.3-18, 2017.

Y. Yin and E. Gelenbe, Single-cell based random neural network for deep learning, 2017 Int. Joint Conference on, pp.86-93, 2017.

Y. Yin and E. Gelenbe, Nonnegative autoencoder with simplified random neural network. CoRR, 2016.