[1]
KAMEPALLI UMA and T HARI BABU, “Using the K-Nearest Neighbour and Moth Blade Optimization Algorithm to Identify Malicious Sessions in IoT Networks”, J. sci. technol., vol. 7, no. 8, pp. 1–9, Dec. 2022.