[1]
KAMEPALLI UMA and T HARI BABU, “Using the K-Nearest Neighbour and Moth Blade Optimization Algorithm to Identify Malicious Sessions in IoT Networks”, Journal of Science & Technology (JST), vol. 7, no. 8, pp. 1–9, Dec. 2022.