[1]
Muhammad Shairoze Malik, “IoT Malware: A Comprehensive Survey of Threats, Vulnerabilities, and Mitigation Strategies”, IJECI, vol. 8, no. 1, pp. 57-66, Mar. 2024.