1.
KAMEPALLI UMA, T HARI BABU. Using the K-Nearest Neighbour and Moth Blade Optimization Algorithm to Identify Malicious Sessions in IoT Networks. Journal of Science & Technology (JST) [Internet]. 2022 Dec. 27 [cited 2024 Dec. 22];7(8):1-9. Available from: https://jst.org.in/index.php/pub/article/view/856