1.
Muhammad Shairoze Malik. IoT Malware: A Comprehensive Survey of Threats, Vulnerabilities, and Mitigation Strategies. IJECI [Internet]. 2024Mar.13 [cited 2025Aug.25];8(1):57-6. Available from: https://ijeci.lgu.edu.pk/ijeci/article/view/187