(1)
Rajih Mohammed, M. Delve into the Architecture of Defensive Strategies to Protect IoT Devices from Targeted Attacks. J. Al-Qadisiyah Comp. Sci. Math. 2025, 17, Comp. 261–271.