%B
@inproceedings{ birnbach2019peeves,
    author = {Birnbach, Simon and Eberz, Simon and Martinovic, Ivan},
    title = {Peeves: Physical Event Verification in Smart Homes},
    year = {2019},
    isbn = {9781450367479},
    publisher = {Association for Computing Machinery},
    address = {New York, NY, USA},
    url = {https://doi.org/10.1145/3319535.3354254},
    doi = {10.1145/3319535.3354254},
    booktitle = {\bibconf[26th]{CCS}{2019 ACM SIGSAC Conference on Computer and Communications Security}},
    pages = {1455–1467},
    numpages = {13},
    keywords = {smart home, internet of things, event verification},
    location = {London, United Kingdom},
    series = {CCS ’19}
}

@inproceedings{ brackenbury2019tap,
	author = {Will Brackenbury and Abhimanyu Deora and Jillian Ritchey and Jason Vallee and Weijia He and Guan Wang and Michael L. Littman and Blase Ur},
	title = {How Users Interpret Bugs in Trigger-Action Programming},
	booktitle = {\bibbrev{HCI}{ACM SIGCHI Conference on Human Factors in Computing Systems }},
	year = {2019},
	address = {Glasgow, Scotland, UK},
}

@article{ brich2017homeauto,
    author = {Brich, Julia and Walch, Marcel and Rietzler, Michael and Weber, Michael and Schaub, Florian},
    title = {Exploring End User Programming Needs in Home Automation},
    journal = {ACM Trans. Comput.-Hum. Interact.},
    issue_date = {May 2017},
    volume = {24},
    number = {2},
    month = apr,
    year = {2017},
    issn = {1073-0516},
    pages = {11:1--11:35},
    articleno = {11},
    numpages = {35},
    url = {http://doi.acm.org/10.1145/3057858},
    doi = {10.1145/3057858},
    keywords = {Configuration interfaces, contextual inquiry, qualitative analysis, smart home},
}

@inproceedings{ brush2011homeAuto,
    author = {Brush, A.J. Bernheim and Lee, Bongshin and Mahajan, Ratul and Agarwal, Sharad and Saroiu, Stefan and Dixon, Colin},
    title = {Home Automation in the Wild: Challenges and Opportunities},
    year = {2011},
    isbn = {9781450302289},
    publisher = {Association for Computing Machinery},
    address = {New York, NY, USA},
    url = {https://doi.org/10.1145/1978942.1979249},
    doi = {10.1145/1978942.1979249},
    booktitle = {\bibbrev{CHI}{SIGCHI Conference on Human Factors in Computing Systems}},
    pages = {2115–2124},
    numpages = {10},
    keywords = {smart home, domestic technology, home automation},
    location = {Vancouver, BC, Canada},
}

%C
@article{ cabitza2017rule,
    author = {Cabitza, Federico and Fogli, Daniela and Lanzilotti, Rosa and Piccinno, Antonio},
    title = {Rule-based Tools for the Configuration of Ambient Intelligence Systems: A Comparative User Study},
    journal = {Multimedia Tools Appl.},
    issue_date = {February  2017},
    volume = {76},
    number = {4},
    month = feb,
    year = {2017},
    issn = {1380-7501},
    pages = {5221--5241},
    numpages = {21},
    url = {https://doi.org/10.1007/s11042-016-3511-2},
    doi = {10.1007/s11042-016-3511-2},
    acmid = {3065413},
    publisher = {Kluwer Academic Publishers},
    address = {Hingham, MA, USA},
    keywords = {Ambient intelligence, End-user development, Interconnection, Internet of things, Rule-based programming, User study},
} 

@inproceedings { celik2018saint,
    author = {Z. Berkay Celik and Leonardo Babun and Amit Kumar Sikder and Hidayet Aksu and Gang Tan and Patrick McDaniel and A. Selcuk Uluagac},
    title = {Sensitive Information Tracking in Commodity {IoT}},
    booktitle = {\bibconf[27th]{{USENIX} Security 2018}{{USENIX} Security Symposium}},
    year = {2018},
    isbn = {978-1-931971-46-1},
    address = {Baltimore, MD},
    pages = {1687--1704},
    url = {https://www.usenix.org/conference/usenixsecurity18/presentation/celik},
    publisher = {{USENIX} Association},
}

@inproceedings { celik2018soteria,
    author = {Z. Berkay Celik and Patrick McDaniel and Gang Tan},
    title = {Soteria: Automated {IoT} Safety and Security Analysis},
    booktitle = {\bibbrev{USENIX ATC 2018}{{USENIX} Annual Technical Conference}},
    year = {2018},
    isbn = {978-1-931971-44-7},
    address = {Boston, MA},
    pages = {147--158},
    url = {https://www.usenix.org/conference/atc18/presentation/celik},
    publisher = {{USENIX} Association},
}

#2019, San Diego, California, USA, February 24-27, 2019},
@inproceedings{ celik2019iotguard,
  author    = {Z. Berkay Celik and
               Gang Tan and
               Patrick D. McDaniel},
  title     = {{IoTGuard}: Dynamic Enforcement of Security and Safety Policy in Commodity
               {IoT}},
  booktitle = {\bibconf[26th]{NDSS}{Annual Network and Distributed System Security Symposium}},
  year      = {2019},
  url       = {https://www.ndss-symposium.org/ndss-paper/iotguard-dynamic-enforcement-of-security-and-safety-policy-in-commodity-iot/},
}

@article{ celik2019progAnalysisIoT,
    author = {Celik, Z. Berkay and Fernandes, Earlence and Pauley, Eric and Tan, Gang and McDaniel, Patrick},
    title = {Program Analysis of Commodity {IoT} Applications for Security and Privacy: Challenges and Opportunities},
    year = {2019},
    issue_date = {September 2019},
    publisher = {Association for Computing Machinery},
    address = {New York, NY, USA},
    volume = {52},
    number = {4},
    issn = {0360-0300},
    url = {https://doi.org/10.1145/3333501},
    doi = {10.1145/3333501},
    journal = {ACM Comput. Surv.},
    month = aug,
    articleno = {Article 74},
    numpages = {30},
    keywords = {program analysis, IoT security and privacy, IoT programming platforms}
}

@article{ celik201905IoTSP,
    author={Z. B. {Celik} and P. {McDaniel} and G. {Tan} and L. {Babun} and A. S. {Uluagac}},
    journal={IEEE Security Privacy},
    title={Verifying {Internet of Things} Safety and Security in Physical Spaces},
    year={2019},
    volume={17},
    number={5},
    pages={30-37},
    keywords={Internet of Things;security of data;physical spaces;IoT devices;Internet of Things safety;Internet of Things security;Internet of Things;Computer Security;Safety;Risk management;Physical design;Cyber-physical systems},
    doi={10.1109/MSEC.2019.2911511},
    ISSN={1558-4046},
    month={Sep.},
}

@inproceedings{ davidoff2006principlesSHC,
    author = {Davidoff, Scott and Lee, Min Kyung and Yiu, Charles and Zimmerman, John and Dey, Anind K.},
    title = {Principles of Smart Home Control},
    year = {2006},
    isbn = {9783540396345},
    publisher = {Springer-Verlag},
    address = {Berlin, Heidelberg},
    url = {https://doi.org/10.1007/11853565_2},
    doi = {10.1007/11853565_2},
    booktitle = {\bibconf[8th]{UbiComp}{International Conference on Ubiquitous Computing}},
    pages = {19–34},
    numpages = {16},
    location = {Orange County, CA},
}

%F
@INPROCEEDINGS{ fernandes2016security,
	author = {E. Fernandes and J. Jung and A. Prakash},
	booktitle = {2016 IEEE Symposium on Security and Privacy (SP)},
	title = {Security Analysis of Emerging Smart Home Applications},
	year = {2016},
	volume = {00},
	number = {},
	pages = {636-654},
	keywords={Smart homes;Security;Programming;Protocols;Smart phones;Intelligent sensors},
	doi = {10.1109/SP.2016.44},
	url = {doi.ieeecomputersociety.org/10.1109/SP.2016.44},
	ISSN = {2375-1207},
	month={May}
}

@inproceedings{ fernandes2018dtap,
    author = {Earlence Fernandes and Amir Rahmati and Jaeyeon Jung and Atul Prakash},
    title = {{Decentralized Action Integrity for Trigger-Action {IoT} Platforms}},
    booktitle = {\bibconf[22nd]{NDSS}{Network and Distributed Security Symposium}},
    month = Feb,
    year = 2018,
}

%G
@article{ ghiani2017tarules,
    author = {Ghiani, Giuseppe and Manca, Marco and Patern\'{o}, Fabio and Santoro, Carmen},
    title = {Personalization of Context-Dependent Applications Through Trigger-Action Rules},
    journal = {ACM Trans. Comput.-Hum. Interact.},
    issue_date = {May 2017},
    volume = {24},
    number = {2},
    month = apr,
    year = {2017},
    issn = {1073-0516},
    pages = {14:1--14:33},
    articleno = {14},
    numpages = {33},
    url = {http://doi.acm.org/10.1145/3057861},
    doi = {10.1145/3057861},
    keywords = {End-user development, internet of things, trigger-action programming},
} 

%H
@inproceedings{ huang2015mentalmodel,
    author = {Huang, Justin and Cakmak, Maya},
    title = {Supporting Mental Model Accuracy in Trigger-action Programming},
    booktitle = {\bibbrev{UbiComp}{ACM International Joint Conference on Pervasive and Ubiquitous Computing}},
    year = {2015},
    isbn = {978-1-4503-3574-4},
    address = {Osaka, Japan},
    pages = {215--225},
    numpages = {11},
    url = {http://doi.acm.org/10.1145/2750858.2805830},
    doi = {10.1145/2750858.2805830},
    keywords = {IFTTT, smart homes, trigger-action programming},
} 

%J
@inproceedings{ jia2017ContexIoT,
    author = {Jia, Yunhan and Chen, Qi Alfred and Wang, Shiqi and Rahmati, Amir and Fernandes, Earlence and Mao, Zhuoqing and Prakash, Atul},
    year = {2017},
    month = {01},
    pages = {},
    title = {{ContexIoT}: Towards Providing Contextual Integrity to Appified {IoT} Platforms},
    doi = {10.14722/ndss.2017.23051}
}

%L
@inproceedings{ liang2016debug,
    author = {Liang, Chieh-Jan Mike and Bu, Lei and Li, Zhao and Zhang, Junbei and Han, Shi and Karlsson, B\"{o}rje F. and Zhang, Dongmei and Zhao, Feng},
    title = {Systematically Debugging {IoT} Control System Correctness for Building Automation},
    booktitle = {\bibconf[3rd]{BuildSys}{ACM International Conference on Systems for Energy-Efficient Built Environments}},
    year = {2016},
    isbn = {978-1-4503-4264-3},
    address = {Palo Alto, CA, USA},
    pages = {133--142},
    numpages = {10},
    url = {http://doi.acm.org/10.1145/2993422.2993426},
    doi = {10.1145/2993422.2993426},
    keywords = {IoT, policy verification, policy violation debugging},
} 

@inproceedings{ liu2019remediot,
    author = {Liu, Renju and Wang, Ziqi and Garcia, Luis and Srivastava, Mani},
    title = {{RemedioT}: Remedial Actions for {Internet-of-Things} Conflicts},
    year = {2019},
    isbn = {9781450370059},
    publisher = {Association for Computing Machinery},
    address = {New York, NY, USA},
    url = {https://doi.org/10.1145/3360322.3360837},
    doi = {10.1145/3360322.3360837},
    booktitle = {\bibconf[6th]{BuildSys}{ACM International Conference on Systems for Energy-Efficient Buildings, Cities, and Transportation}},
    pages = {101–110},
    numpages = {10},
    keywords = {Environment safety, IoT conflicts, Smart Environment},
    location = {New York, NY, USA},
}

%M
@article{ meng2019cpsSecurity,
    author = {孟岩,李少锋,张亦弛,朱浩瑾,张新鹏},
    title = {面向智能家居平台的信息物理融合系统安全},
    publisher = {计算机研究与发展},
    year = {2019},
    journal = {计算机研究与发展},
    volume = {56},
    number = {11},
    eid = {2349},
    numpages = {15},
    pages = {2349},
    keywords = {智能家居平台;安全分析;隐私保护;对抗机器学习;恶意应用检测},
    url = {http://crad.ict.ac.cn/CN/abstract/article_4041.shtml},
    doi = {10.7544/issn1000-1239.2019.20190412}
}    


@inproceedings{ mi2017ifttt,
    author = {Mi, Xianghang and Qian, Feng and Zhang, Ying and Wang, XiaoFeng},
    title = {An Empirical Characterization of {IFTTT}: Ecosystem, Usage, and Performance},
    booktitle = {\bibbrev{IMC}{Internet Measurement Conference}},
    year = {2017},
    isbn = {978-1-4503-5118-8},
    address = {London, United Kingdom},
    pages = {398--404},
    numpages = {7},
    url = {http://doi.acm.org/10.1145/3131365.3131369},
    doi = {10.1145/3131365.3131369},
    keywords = {IFTTT, IoT, measurement},
}

%N
@inproceedings{ nandi2016autotrigger,
    author = {Nandi, Chandrakana and Ernst, Michael D.},
    title = {Automatic Trigger Generation for Rule-Based Smart Homes},
    year = {2016},
    isbn = {9781450345743},
    publisher = {Association for Computing Machinery},
    address = {New York, NY, USA},
    url = {https://doi.org/10.1145/2993600.2993601},
    doi = {10.1145/2993600.2993601},
    booktitle = {Proceedings of the 2016 ACM Workshop on Programming Languages and Analysis for Security},   
    pages = {97–102},
    numpages = {6},
    keywords = {security, static analysis, trigger action programming, home automation},
    location = {Vienna, Austria},
}

@inproceedings{ nguyen2018iotsan,
    author = {Nguyen, Dang Tu and Song, Chengyu and Qian, Zhiyun and Krishnamurthy, Srikanth V. and Colbert, Edward J. M. and McDaniel, Patrick},
    title = {{IotSan}: Fortifying the Safety of {IoT} Systems},
    year = {2018},
    isbn = {9781450360807},
    publisher = {Association for Computing Machinery},
    address = {New York, NY, USA},
    url = {https://doi.org/10.1145/3281411.3281440},
    doi = {10.1145/3281411.3281440},
    booktitle = {\bibconf[14th]{CoNext}{International Conference on Emerging Networking EXperiments and Technologies}},
    pages = {191–203},
    numpages = {13},
    location = {Heraklion, Greece},
    series = {CoNEXT ’18}
}


%R
@article{ rahmati2017IFTTTvsZapier,
    author    = {Amir Rahmati and
               Earlence Fernandes and
               Jaeyeon Jung and
               Atul Prakash},
    title     = {{IFTTT} vs. Zapier: {A} Comparative Study of Trigger-Action Programming
               Frameworks},
    journal   = {CoRR},
    volume    = {abs/1709.02788},
    year      = {2017},
    url       = {http://arxiv.org/abs/1709.02788},
    archivePrefix = {arXiv},
    eprint    = {1709.02788},
    timestamp = {Mon, 13 Aug 2018 16:48:22 +0200},
    biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1709-02788},
    bibsource = {dblp computer science bibliography, https://dblp.org}
}

%S
@inproceedings{ surbatovich2017IFTTTrecipes,
    author = {Surbatovich, Milijana and Aljuraidan, Jassim and Bauer, Lujo and Das, Anupam and Jia, Limin},
    title = {Some Recipes Can Do More Than Spoil Your Appetite: Analyzing the Security and Privacy Risks of {IFTTT} Recipes},
    booktitle = {\bibconf[26th]{WWW}{International Conference on World Wide Web}},
    year = {2017},
    isbn = {978-1-4503-4913-0},
    address = {Perth, Australia},
    pages = {1501--1510},
    numpages = {10},
    url = {https://doi.org/10.1145/3038912.3052709},
    doi = {10.1145/3038912.3052709},
    keywords = {end-user programming, ifttt service, information-flow, internet of things (iot)},
} 

%T

%U
@inproceedings{ ur2014tap,
    author = {Ur, Blase and McManus, Elyse and Pak Yong Ho, Melwyn and Littman, Michael L.},
    title = {Practical Trigger-action Programming in the Smart Home},
    booktitle = {\bibbrev{CHI}{SIGCHI Conference on Human Factors in Computing Systems}},
    year = {2014},
    isbn = {978-1-4503-2473-1},
    address = {Toronto, Ontario, Canada},
    pages = {803--812},
    numpages = {10},
    url = {http://doi.acm.org/10.1145/2556288.2557420},
    doi = {10.1145/2556288.2557420},
    keywords = {condition-action programming, end-user programming, home automation, internet of things, smart home},
}

%W
@inproceedings{ wang2018logIoT,
    author = {Qi Wang and Wajih Ul Hassan and Adam Bates and Carl Gunter},
    title = {Fear and Logging in the {Internet of Things}},
    booktitle = {\bibconf[22nd]{NDSS}{Network and Distributed Security Symposium}},
    month = Feb,
    year = 2018,
}

@inproceedings{ wang2019charting,
    author = {Wang, Qi and Datta, Pubali and Yang, Wei and Liu, Si and Bates, Adam and Gunter, Carl A.},
    title = {Charting the Attack Surface of Trigger-Action {IoT} Platforms},
    year = {2019},
    isbn = {9781450367479},
    publisher = {Association for Computing Machinery},
    address = {New York, NY, USA},
    url = {https://doi.org/10.1145/3319535.3345662},
    doi = {10.1145/3319535.3345662},
    booktitle = {\bibconf[26th]{CCS}{2019 ACM SIGSAC Conference on Computer and Communications Security}},
    pages = {1439–1453},
    numpages = {15},
    keywords = {trigger-action iot platform, nlp, information flow, inter-rule vulnerability, formal methods},
    location = {London, United Kingdom},
    series = {CCS ’19}
}

@inproceedings{ woo2015smarthome,
    author = {Woo, Jong-bum and Lim, Youn-kyung},
    title = {User Experience in Do-it-yourself-style Smart Homes},
    booktitle = {\bibbrev{UbiComp}{ACM International Joint Conference on Pervasive and Ubiquitous Computing}},
    year = {2015},
    isbn = {978-1-4503-3574-4},
    address = {Osaka, Japan},
    pages = {779--790},
    numpages = {12},
    url = {http://doi.acm.org/10.1145/2750858.2806063},
    doi = {10.1145/2750858.2806063},
    keywords = {design, do-it-yourself, domestic technology, end-user programming, smart home},
} 

%X
@article{ xiao2019detectKGraph,
    title={Research on implicit interference detection based on knowledge graph in smart home automation (in Chinese)},
    author={Ding Xiao and Qianyu Wang and Ming Cai and Xiu Li},
    booktitle = {Chinese Journal of Computers},
    volume = 42,
    year = 2019,
    number = 6,
    pages = {1190-1204},
}

@article{ cn:xiao2019detectKGraph,
    title={智能家居场景联动中基于知识图谱的隐式冲突检测方法研究},
    author={肖丁 and 王乾宇 and 蔡铭 and 李秀},
    booktitle = {计算机学报},
    volume = 42,
    year = 2019,
    number = 6,
    pages = {1190-1204},
}

%Y
@inproceedings{ yarosh2017locked,
    author = {Yarosh, Svetlana and Zave, Pamela},
    title = {Locked or Not?: Mental Models of {IoT} Feature Interaction},
    booktitle = {\bibbrev{CHI}{CHI Conference on Human Factors in Computing Systems}},
    year = {2017},
    isbn = {978-1-4503-4655-9},
    address = {Denver, Colorado, USA},
    pages = {2993--2997},
    numpages = {5},
    url = {http://doi.acm.org/10.1145/3025453.3025617},
    doi = {10.1145/3025453.3025617},
    keywords = {feature interaction, home automation, iot, mental models},
} 

%Z
@inproceedings{ zhang2018homonit,
	author = {Zhang, Wei and Meng, Yan and Liu, Yugeng and Zhang, Xiaokuan and Zhang, Yinqian and Zhu, Haojin},
	title = {HoMonit: Monitoring Smart Home Apps from Encrypted Traffic},
	booktitle = {\bibbrev{CCS 2018}{ACM SIGSAC Conference on Computer and Communications Security}},
	year = {2018},
	isbn = {978-1-4503-5693-0},
	location = {Toronto, Canada},
	pages = {1074--1088},
	numpages = {15},
	url = {http://doi.acm.org/10.1145/3243734.3243820},
	doi = {10.1145/3243734.3243820},
	acmid = {3243820},
	publisher = {ACM},
	address = {New York, NY, USA},
	keywords = {IoT security, app misbehavior detection, smart home},
}

@inproceedings{ zhang2019autotap,
	author = {Zhang, Lefan and He, Weijia and Martinez, Jesse and Brackenbury, Noah and Lu, Shan and Ur, Blase},
	title = {AutoTap: Synthesizing and Repairing Trigger-Action Programs Using LTL Properties},
	booktitle = {\bibconf[41st]{ICSE}{International Conference on Software Engineering}},
	year = {2019},
	address = {Montr\'eal, QC, Canada},
}


@inproceedings { primal2015AndroidPermission,
    author = {Primal Wijesekera and Arjun Baokar and Ashkan Hosseini and Serge Egelman and David Wagner and Konstantin Beznosov},
    title = {Android Permissions Remystified: A Field Study on Contextual Integrity},
    booktitle = {24th {USENIX} Security Symposium ({USENIX} Security 15)},
    year = {2015},
    isbn = {978-1-931971-232},
    address = {Washington, D.C.},
    pages = {499--514},
    url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/wijesekera},
    publisher = {{USENIX} Association},
}

@inproceedings{olejnik2017smarper,
  title={SmarPer: Context-aware and automatic runtime-permissions for mobile devices},
  author={Olejnik, Katarzyna and Dacosta, Italo and Machado, Joana Soares and Huguenin, K{\'e}vin and Khan, Mohammad Emtiyaz and Hubaux, Jean-Pierre},
  booktitle={2017 IEEE Symposium on Security and Privacy (SP)},
  pages={1058--1076},
  year={2017},
  organization={IEEE}
}

@article{abdella2016arbac,
  title={CA-ARBAC: privacy preserving using context-aware role-based access control on Android permission system},
  author={Abdella, J and {\"O}zuysal, Mustafa and Tomur, Emrah},
  journal={Security and Communication Networks},
  volume={9},
  number={18},
  pages={5977--5995},
  year={2016},
  publisher={Wiley Online Library}
}

@article{ren2018easyprivacy,
  title={EasyPrivacy: Context-Aware Resource Usage Control System for Android Platform},
  author={Ren, Bingfei and Liu, Chuanchang and Cheng, Bo and Hong, Shuangxi and Guo, Jie and Chen, Junliang},
  journal={IEEE Access},
  volume={6},
  pages={44506--44518},
  year={2018},
  publisher={IEEE}
}

@inproceedings{wijesekera2015android,
  title={Android permissions remystified: A field study on contextual integrity},
  author={Wijesekera, Primal and Baokar, Arjun and Hosseini, Ashkan and Egelman, Serge and Wagner, David and Beznosov, Konstantin},
  booktitle={24th $\{$USENIX$\}$ Security Symposium ($\{$USENIX$\}$ Security 15)},
  pages={499--514},
  year={2015}
}

@book{Elenkov:2014:ASI:2631372,
 author = {Elenkov, Nikolay},
 title = {Android Security Internals: An In-Depth Guide to Android's Security Architecture},
 year = {2014},
 isbn = {1593275811, 9781593275815},
 edition = {1st},
 publisher = {No Starch Press},
 address = {San Francisco, CA, USA},
}

@article{BackesAndroidPermMapping,
  title={Poster: On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis},
  author={Backes, Michael and Bugiel, Sven and Derr, Erik and Weisgerber, Sebastian and McDaniel, Patrick and Octeau, Damien}
}

% TODO: An Empirical Characterization of IFTTT: Ecosystem, Usage, and Performance

%Website
@misc{ homeAssistant,
    author = {{Home Assistant}},
    title = {Home Assistant: Awaken your home},
    howpublished = "Online at \url{https://www.home-assistant.io/}",
    url = {https://www.home-assistant.io/},
    year = "Accessed 2019",
}

@misc{ ifttt,
    author = {{IFTTT}},
    title = {{If This Then That}},
    howpublished = "Online at \url{https://ifttt.com/}",
    url = {https://ifttt.com/},
    year = "Accessed 2018",
}

@misc{ iftttOneConn,
    author = {{IFTTT}},
    title = {One connection, countless possibilities},
    howpublished = "Online at \url{https://platform.ifttt.com/lp/learn_more}",
    url={https://platform.ifttt.com/lp/learn_more},
    year = "Accessed 2019",
}

@misc{ stringify2016,
    author = {Ed Oswald},
    title = {{IFTTT} competitor Stringify gets a major update},
    url={https://www.techhive.com/article/3086988/ifttt-competitor-stringify-gets-a-major-update.html},
    year = "2016",
    month = jun,
    day = 22,
}

@misc{ smartrules2016,
    title = {Announcing {SmartRules} 2.0!},
    howpublished = "Online at \url{http://smartrulesapp.com/2016/04/26/announcing-smartrules-2-0/}",
    url = {http://smartrulesapp.com/2016/04/26/announcing-smartrules-2-0/},
    year = "2016",
    month=apr,
    day = 26,
}

@misc{ openHAB,
    author = {{openHAB}},
    title = {{openHAB} empowering the smart home},
    howpublished = "Online at \url{https://www.openhab.org/}",
    url = {https://www.openhab.org/},
    year = "Accessed 2019",
}

@misc{ switchur2017platform,
    author = {Switchur.com},
    title = {Platform comparison: {IFTTT} vs {Microsoft Flow} vs {Zapier}},
    howpublished = "Online at \url{https://blog.switchur.com/2017/11/12/Platform-comparison-IFTTT-vs-Microsoft-Flow-vs-Zapier/}",
    url={https://blog.switchur.com/2017/11/12/Platform-comparison-IFTTT-vs-Microsoft-Flow-vs-Zapier/},
    year = "2017",
    month = {11},
}

@misc{ marketwatch2019smarthome,
    author = {MarketWatch},
    title = {Global Smart Home Market Size, Growth, Opportunity and Forecast to 2025},
    howpublished = "Online at \url{https://www.marketwatch.com/press-release/global-smart-home-market-size-growth-opportunity-and-forecast-to-2025-2019-11-04}",
    url={https://www.marketwatch.com/press-release/global-smart-home-market-size-growth-opportunity-and-forecast-to-2025-2019-11-04},
    year = "2019",
    month = {11},
}

@misc{ cn:iresearch2018smarthhome,
    author = {艾瑞咨询公司},
    title = {2018年中国智能家居行业研究报告},
    howpublished = "Online at \url{http://report.iresearch.cn/report/201808/3256.shtml}",
    url={http://report.iresearch.cn/report/201808/3256.shtml},
    year = "2018",
    month = {8},
}

@misc{ cn:forward2019iot,
    author = {前瞻产业研究院},
    title = {2019年物联网行业市场研究报告},
    howpublished = "Online at \url{http://www.cbdio.com/BigData/2019-08/20/content_6150602.htm}",
    url={http://www.cbdio.com/BigData/2019-08/20/content_6150602.htm},
    year = "2019",
    month = {8},
}

@misc{ cn:li2019smarthhome,
    author = {李晓晓},
    title = {5G时代下的智能家居竞争格局———36Kr-智能家居行业研究报告},
    howpublished = "Online at \url{https://36kr.com/p/5249850}",
    year = "2019",
    url={https://36kr.com/p/5249850},
    month = {10},
}
