[1]
“Analysis of Lorawan Protocol and Attacks Against Lorawan-Based IoT Devices”, J. Appl. Methods Electron. Comput., vol. 12, no. 2, pp. 33–39, Jun. 2024, doi: 10.58190/ijamec.2024.95.