[1]
J. Mook KANG, C. Hee YOON, and J. SHIN, “A Study on Development of IoT Software Vulnerability (Using Fake Information) Response System based on Artificial Intelligence”, IJET, vol. 7, no. 3.33, pp. 157–160, Aug. 2018, doi: 10.14419/ijet.v7i3.33.18598.