[1]
T. Keerthi and M. Agarwal, “Fog Computing and its Security Issues”, Int. J. Comp. Sci. Eng., vol. 7, no. 9, pp. 87–90, Nov. 2025.