(1)
KAMEPALLI UMA; T HARI BABU. Using the K-Nearest Neighbour and Moth Blade Optimization Algorithm to Identify Malicious Sessions in IoT Networks. Journal of Science & Technology (JST) 2022, 7, 1-9.