[1]
Ayesha Munir, Irshad Ahmed Sumra, Rania Naveed, and Muhammad Aaqib Javed, “Techniques for Authentication and Defense Strategies to Mitigate IoT Security Risks”, JCBI, vol. 7, no. 01, pp. 377–388, Jun. 2024.