Ayesha Munir, Irshad Ahmed Sumra, Rania Naveed, and Muhammad Aaqib Javed. “Techniques for Authentication and Defense Strategies to Mitigate IoT Security Risks”. Journal of Computing & Biomedical Informatics 7, no. 01 (June 1, 2024): 377–388. Accessed November 23, 2024. https://jcbi.org/index.php/Main/article/view/330.