[1] Furqan Rustam, Md Salauddin, Usman Saeed and Anca Delia Jurcut, "Dual-Approach Machine Learning for Robust Cyber-Attack Detection in Water Distribution System". 

[2] Maitham Al-Rubaye and Atakan Aral, "Towards Enhanced AI-Driven Security in Monitoring Systems with Low-Cost IoT Devices".

[3] Vadim Safronov, Ionut Bostan, Nicholas Allott and Andrew Martin, "How Memory-Safe is IoT? Assessing the Impact of Memory-Protection Solutions for Securing Wireless Gateways".

[4] Jose M. Molina, Alvaro Bustamante and Miguel Angel Patricio, "Vulnerability Analysis of IoT Platforms: A Case Study on Thinger.io".

[5] Pramod Munaweera, Suranga Prasad, Tharaka Hewa, Yushan Siriwardhana and Mika Ylianttila, "Federated Learning-Powered DDoS Attack Detection for Securing Cyber Physical Systems in 5G and Beyond Networks".

[6] Arslan Ahmed, Mert Comert and Hafiz Ahmed, "A Hardware-in-the-Loop Framework for Remote Monitoring of Safety Critical Systems".

[7] Mert Comert, Arslan Ahmed and Hafiz Ahmed, "Identifying Security Challenges in the Transition from Traditional to Smart Manufacturing Through IIoT Retrofitting".