Skip to main content
. 2022 Sep 15;12:15498. doi: 10.1038/s41598-022-18936-9

Figure 4.

Figure 4

(a) The proposed IoT malware detection architecture (b) STM block (c) details of blocks used in the architecture.