(1)
Muhammad Shairoze Malik. IoT Malware: A Comprehensive Survey of Threats, Vulnerabilities, and Mitigation Strategies. IJECI 2024, 8, 57-66.