[
[1] ZhangBo, Intelligent Building Security System Design based on Internet of Things Technology, 4th National Conference on Electrical, Electronics and Computer Engineering, 2015.
]Search in Google Scholar
[
[2] Arun Cyril Jose, Reza Malekian, Ning Ye, Improving Home Automation Security; Integrating Device Fingerprinting Into Smart Home, IEEE Access.
]Search in Google Scholar
[
[3] C. Perera, A. Zaslavsky, P. Christen, D. Georgakopoulos, Context Aware Computing for The Internet of Things: A Survey, IEEE Communications Surveys & Tutorials, 2013.10.1109/GreenCom.2012.128
]Search in Google Scholar
[
[4] J. Sathish Kumar, Dhiren R. Patel, A Survey on Internet of Things: Security and Privacy Issues, International Journal of Computer Applications, 2014.10.5120/15764-4454
]Search in Google Scholar
[
[5] Serena Zheng, Noah Apthorpe, Marshini Chetty, Nick Feamster, User Perceptions of Smart Home IoT Privacy, Proc. ACM Hum. - Comput. Interact., Vol. 2.10.1145/3274469
]Search in Google Scholar
[
[6] Rajiv Kumar, Pooja Mittal, A Novel Design and Implementation of Smart Home Security System: Future Perspective, International Journal of Applied Engineering Research, Volume 14, Number 2, 2019
]Search in Google Scholar
[
[7] A S Romadhon, System Security And Monitoring On Smart Home Using Android, The 2nd International Joint Conference on Science and Technology (IJCST) 2017.10.1088/1742-6596/953/1/012128
]Search in Google Scholar
[
[8] Filip Truta, Home security: 3 methods by which you secure your home, in addition to the alarm, computer security specialist at Bitdefender.
]Search in Google Scholar
[
[9] Drushti Desai, Hardik Upadhyay, Security and Privacy Consideration for Internet of Things in Smart Home Environments, International Journal of Engineering Research and Development, Volume 10.
]Search in Google Scholar
[
[10] Survey conducted by Atu Tech (A2T.ro), “How Romanians prefer to secure their homes”, 2019.
]Search in Google Scholar
[
[11] https://www.goodhousekeeping.com/uk/product-reviews/tech/g32912843/best-smart-alarm-systems/
]Search in Google Scholar