[1]
Rajih Mohammed, M. 2025. Delve into the architecture of defensive strategies to protect IoT devices from targeted attacks. Journal of Al-Qadisiyah for Computer Science and Mathematics. 17, 2 (Jun. 2025), Comp. 261–271. DOI:https://doi.org/10.29304/jqcsm.2025.17.22201.