Abstract
I. INTRODUCTION
II. RELATED WORK
III. PROPOSED MODEL
IV. THREAT IDENTIFICATION ON THE MODEL
A. AI Model(component A)
B. Cloud Computing (component B)
C. IoT Devices (component C)
D. Network Analysis (component D)
V. CONCLUSION
ACKNOWLEDGMENT
REFERENCES