(1)
M, I.; Emmah, V. Development of a Model for the Detection of Malicious Activities on Edge Computing. Int. J. Comp. Sci. Eng. 2024, 12, 18-24.