(1)
Cybersecurity Risk Assessment for Identifying Threats, Vulnerabilities and Countermeasures in the IoT. Mesopotamian Journal of CyberSecurity 2025, 5 (2), 514-537. https://doi.org/10.58496/MJCS/2025/032.