[1]
“Deep Learning Security Schemes in IIoT: A Review ”, Int. J. Res. Appl. Tech., vol. 5, no. 1, pp. 34–64, Apr. 2025, Accessed: May 10, 2025. [Online]. Available: https://ojs.unikom.ac.id/index.php/injuratech/article/view/15851