[1]
Muhammad Hamza Hayat, Asad Liaqat, Laiba Shoaib, and Abdul Rehman Chishti, “A COMPREHENSIVE REVIEW OF IOT VULNERABILITY SCANNING: ACTIVE, PASSIVE, AND HYBRID METHODOLOGIES”, SES, vol. 4, no. 4, pp. 1194–1206, Apr. 2026.