[1]
I. M and V. Emmah, “Development of a Model for the Detection of Malicious Activities on Edge Computing”, Int. J. Comp. Sci. Eng., vol. 12, no. 8, pp. 18–24, Aug. 2024.