AYESHA MUNIR; IRSHAD AHMED SUMRA; RANIA NAVEED; MUHAMMAD AAQIB JAVED. Techniques for Authentication and Defense Strategies to Mitigate IoT Security Risks. Journal of Computing & Biomedical Informatics, [S. l.], v. 7, n. 01, p. 377–388, 2024. Disponível em: https://jcbi.org/index.php/Main/article/view/330. Acesso em: 3 jul. 2024.