[1]
“Threat and Vulnerability Modelling of Malicious Human Interface Devices”, EPSTEM, vol. 21, pp. 241–247, Dec. 2022, doi: 10.55549/epstem.1225679.