X. Li, R. Lu, X. Liang, and X. Shen, “Smart community: An Internet of Things application,” IEEE Commun. Magazine, vol. 49, no. 11, pp. 68-75, Nov. 2011.
 Z. Sheng, S. Yang, Y. Yu, and A. Vasilakos, “A survey on the IETF protocol suite for the Internet of Things: Standards, challenges, and opportunities,” IEEE Wireless Commun., vol. 20, no. 6, pp. 91-98, Dec. 2013. [OpenAIRE]
 X. Liu, M. Zhao, S. Li, F. Zhang, and W. Trappe, “A security framework for the Internet of Things in the future Internet architecture,” Future Internet, vol. 9, no. 3, pp. 1-28, Jun. 2017.
 I. Andrea, C. Chrysostomou, and G. Hadjichristofi, “Internet of Things: Security vulnerabilities and challenges,” in Proc. IEEE Symposium on Computers and Commun, pp. 180-187, Larnaca, Cyprus, Feb. 2015.
 R. Roman, J. Zhou, and J. Lopez, “On the features and challenges of security and privacy in distributed Internet of Things,” Computer Networks, vol. 57, no. 10, pp. 2266-2279, Jul. 2013.
 S. Chen, H. Xu, D. Liu, and B. Hu, “A vision of IoT: Applications, challenges, and opportunities with china perspective,” IEEE Internet of Things Journal, vol. 1, no. 4, pp. 349-359, Jul. 2014.
 J. Zhou, Z. Cao, X. Dong, and A. V. Vasilakos, “Security and privacy for cloud-based IoT: Challenges,” IEEE Commun. Magazine, vol. 55, no. 1, pp. 26-33, Jan. 2017. [OpenAIRE]
 L. Xiao, Y. Li, G. Han, G. Liu, and W. Zhuang, “PHY-layer spoofing detection with reinforcement learning in wireless networks,” IEEE Trans. Vehicular Technology, vol. 65, no. 12, pp. 10037-10047, Dec. 2016.
 M. Abu Alsheikh, S. Lin, D. Niyato, and H. P. Tan, “Machine learning in wireless sensor networks: Algorithms, strategies, and applications,” IEEE Commun. Surveys and Tutorials, vol. 16, no. 4, pp. 1996-2018, Apr. 2014.
 L. Xiao, C. Xie, T. Chen, and H. Dai, “A mobile offloading game against smart attacks,” IEEE Access, vol. 4, pp. 2281-2291, May 2016.
 L. Xiao, Y. Li, X. Huang, and X. J. Du, “Cloud-based malware detection game for mobile devices with offloading,” IEEE Trans. Mobile Computing, vol. 16, no. 10, pp. 2742-2750, Oct. 2017.
 M. Ozay, I. Esnaola, F. T. Yarman Vural, S. R. Kulkarni, and H. V. Poor, “Machine learning methods for attack detection in the smart grid,” IEEE Trans. Neural Networks and Learning Systems, vol. 27, no. 8, pp. 1773-1786, Mar. 2015.
 J. W. Branch, C. Giannella, B. Szymanski, R. Wolff, and H. Kargupta, “In-network outlier detection in wireless sensor networks,” Knowledge and Information Systems, vol. 34, no. 1, pp. 23-54, Jan. 2013.
 F. A. Narudin, A. Feizollah, N. B. Anuar, and A. Gani, “Evaluation of machine learning classifiers for mobile malware detection,” Soft Computing, vol. 20, no. 1, pp. 343-357, Jan. 2016. [OpenAIRE]
 A. L. Buczak and E. Guven, “A survey of data mining and machine learning methods for cyber security intrusion detection,” IEEE Commun. Surveys and Tutorials, vol. 18, no. 2, pp. 1153-1176, Oct. 2015.