KAMEPALLI UMA; T HARI BABU. Using the K-Nearest Neighbour and Moth Blade Optimization Algorithm to Identify Malicious Sessions in IoT Networks. Journal of Science & Technology (JST), [S. l.], v. 7, n. 8, p. 1–9, 2022. DOI: 10.46243/jst.2022.v7.i8.pp1-9. Disponível em: https://jst.org.in/index.php/pub/article/view/856. Acesso em: 28 sep. 2024.