[1]
KAMEPALLI UMA and T HARI BABU 2022. Using the K-Nearest Neighbour and Moth Blade Optimization Algorithm to Identify Malicious Sessions in IoT Networks. Journal of Science & Technology (JST). 7, 8 (Dec. 2022), 1–9. DOI:https://doi.org/10.46243/jst.2022.v7.i8.pp1-9.