1. G. Eason, B. Noble, and I. N. Sneddon, “On certain integrals of Lipschitz-Hankel type involving products of Bessel functions,” Phil. Trans. Roy. Soc. London, vol. A247, pp. 529–551, April 1955. (references)
2. J. Clerk Maxwell, A Treatise on Electricity and Magnetism, 3rd ed., vol. 2. Oxford: Clarendon, 1892, pp.68–73.
3. I. S. Jacobs and C. P. Bean, “Fine particles, thin films and exchange anisotropy,” in Magnetism, vol. III, G. T. Rado and H. Suhl, Eds. New York: Academic, 1963, pp. 271–350.
4. Lombardi, Marco, Francesco Pascale, and Domenico Santaniello. "Internet of things: A general overview between architectures, protocols and applications." Information 12, no. 2 (2021): 87.
5. Dunkels A, Grönvall B, Voigt T. Contiki—a lightweight and flexible operating system for tiny networked sensors. In Proceedings of 1st IEEE Workshop on Embedded Networked Sensors (EmNetS’04), Tampa, USA, 2004
6. Liu A, Ning P. TinyECC: a configurable library for elliptic curve cryptography in wireless sensor networks. In Proceedings of 7th International Conference on Information Processing in Sensor Networks (IPSN’08), Washington, DC, USA, 2008.
7. Szczechowiak P, Oliveira L, Scott M, Collier M, Dahab R. NanoECC: testing the limits of elliptic curve cryptography in sensor networks. In Proceedings of 5th European Conference on Wireless Sensor Networks (EWSN’08), Bologna, Italy, 2008.
8. Liu D, Ning P. Establishing pairwise keys in distributed sensor networks. In Proceedings of 10th ACM Conference on Computer and Communications Security (CCS), New York, NY, USA, 2003.
9. Chung A, Roedig U. DHB-KEY: an efficient key distribution scheme for wireless sensor networks. In Proceedings of 4th IEEE International Workshop on Wireless and Sensor Networks Security (WSNS’08), Atlanta, USA, 2008.
10. Arch Rocks Adds Ruggedized Version Of IP-Based ‘PhyNet’ Wireless Sensor Network for Harsh Outdoor Enivorments, With PhyNet N4X, Protected Devices Monitor Air Quality, Traffic, Toxics, Solar Power, Crop Health and More; Users Analyze the Data Remotely,2008
11. Roman R, Alcaraz C, Lopez J, Sklavos N. Key management systems for sensor networks in the context of the Internet of Things. Computers and Electrical Engineering 2011; 37(2): 147–159.
12. Oppliger, Rolf. SSL and TLS: Theory and Practice. Artech House, 2023.
13. Hong S, Kim D, Ha M, et al. SNAIL: an IP-based wireless sensor network approach to the Internet of Things. Wireless Communications, IEEE 2010; 17(6): 34–42.
14. Shahid Raza, Simon Duquennoy, Joel Höglund,Utz Roedig and Thiemo Voigt: Secure communication for the Internet of Things— a comparison of link-layer security and IPsec for 6LoWPAN, Networks 2014; 7:2654–2668 .
15. Rachit, Shobha Bhatt, and Prakash Rao Ragiri. "Security trends in Internet of Things: A survey." SN Applied Sciences 3 (2021): 1-14.
16. D.Geneiatakis, I.Kounelis, R.Neisse , I.Nai-Fovino ” Security and Privacy Issues for an IoT based Smart Home” 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO) , Pages: 1292 - 1297 IEEE Conference Publications.
17. Hamdan, Salam, Moussa Ayyash, and Sufyan Almajali. "Edgecomputing architectures for internet of things applications: A survey." Sensors 20, no. 22 (2020): 6441.
18. Nick Heudecker. DBMS Characteristics for the Internet of Things. 2015. gartner.com
19. Scott Matteson. How to secure your IoT devices from botnets and other threats. 2017.techrepublic.com.
20. Anthi, Eirini, Lowri Williams, Małgorzata Słowińska, George Theodorakopoulos, and Pete Burnap. "A supervised intrusion detection system for smart home IoT devices." IEEE Internet of Things Journal 6, no. 5 (2019): 9042-9053.
21. Jin, Wenquan, and Dohyeun Kim. "Resource management based on OCF for device self-registration and status detection in IoT networks." Electronics 8, no. 3 (2019): 311.