[1]
M. Rajih Mohammed, “Delve into the architecture of defensive strategies to protect IoT devices from targeted attacks”, J. Al-Qadisiyah Comp. Sci. Math., vol. 17, no. 2, pp. Comp. 261–271, Jun. 2025.