[1]
A. Al-Marghilani, “Comprehensive Analysis of IoT Malware Evasion Techniques”, Eng. Technol. Appl. Sci. Res., vol. 11, no. 4, pp. 7495–7500, Aug. 2021.