[1]
“SECURITY CHALLENGES IN EDGE COMPUTING”, IJFIAHM, vol. 3, no. 1, pp. 431–442, Mar. 2024, doi: 10.59367/0a04qv85.