[1]
Anita Seth, “REVIEW OF INTRUSION DETECTION SCHEMES IN FOG COMPUTING USING MACHINE AND DEEP LEARNING TECHNIQUES: CONCEPTS, CHALLENGES AND OPEN ISSUES”, IJASCIS, vol. 4, no. 1, pp. 74–97, Jan. 2025.