[1]
J. E. Soto-Soto, J. I. Hernandez-Vega, A. G. Silva Trujillo, L. A. Reynoso-Guajardo, C. Hernandez-Santos, and M. C. Gallardo-Morales, “A Review of the perspective on the implementation of evolutionary algorithms in cyber security on IoT infrastructure”, Int. Journal of COP and Infor., vol. 16, no. 4, pp. 375–380, Oct. 2025.