A Model for Identification of Compromised Devices as a Result of Cyberattack on IoT Devices | IEEE Conference Publication | IEEE Xplore