[4] The growing threat of mobile device security breaches -https://blog.checkpoint.com/wp-content/uploads/2017/04/Dimensional_Enterprise-Mobile-Security-Survey.pdf
[6] Billions of Bluetooth devices vulnerable to MITM attacks; no user action -https://www.scmagazineuk.com/billions-bluetooth-devices-vulnerable-mitm-attacks-no-user-action/article/1474116
[8] N. Jeyanthi and R. Thandeeswaran, Eds., “Security Breaches and Threat Prevention in the Internet of Things,” Advances in Information Security, Privacy, and Ethics, 2017.10.4018/978-1-5225-2296-6