Ayesha Munir, Irshad Ahmed Sumra, Rania Naveed and Muhammad Aaqib Javed (2024) “Techniques for Authentication and Defense Strategies to Mitigate IoT Security Risks”, Journal of Computing & Biomedical Informatics, 7(01), pp. 377–388. Available at: https://jcbi.org/index.php/Main/article/view/330 (Accessed: 23 November 2024).