Roy Chowdhury, Rajarshi; Che Idris, Azam; Abas, Pg Emeroylariffion
(2022-08-06)
In recent years, resource-constrained Internet of Things (IoT) devices have been incorporated in many domains. However, malicious users and attackers in the cyberspace have been taking advantage of these technological ...