(1)
Anita Seth. REVIEW OF INTRUSION DETECTION SCHEMES IN FOG COMPUTING USING MACHINE AND DEEP LEARNING TECHNIQUES: CONCEPTS, CHALLENGES AND OPEN ISSUES. IJASCIS 2025, 4, 74-97.