[1]
M. K. Yogi and D. Aiswarya, “Designing Greedy Algorithm for Cyber Threat Detection”, JISMAC, vol. 5, no. 3, pp. 200–218, Sep. 2023, doi: 10.36548/jismac.2023.3.002.