Threat models for vulnerability analysis of IoT devices for Manipulation of Demand attacks | IEEE Conference Publication | IEEE Xplore