Identifying Critical Nodes in Complex Networks: A Study of Iterative Algorithms with 6LoWPAN RPL-Powered Cooja
Security in IoT Networks. Simulation, capture, and traffic analysis using Contiki Cooja software and RPL protocols for anomaly detection