1.
Ayesha Munir, Irshad Ahmed Sumra, Rania Naveed, Muhammad Aaqib Javed. Techniques for Authentication and Defense Strategies to Mitigate IoT Security Risks. JCBI [Internet]. 2024 Jun. 1 [cited 2024 Nov. 23];7(01):377-88. Available from: https://jcbi.org/index.php/Main/article/view/330