1.
Bhumika S Prajapati. LSTM-Based Cybersecurity Framework Utilizing Image Processing Techniques. IJRASHT [Internet]. 2025 Oct. 30 [cited 2026 Apr. 30];2(4):296-300. Available from: https://ijrasht.com/index.php/files/article/view/251