[1]
T. Pavan Kumar, B. Eswar, P. Ayyappa Reddy, and D. Sindhu Bhargavi, “An efficient fog computing for comprising approach to avoid data theft attack”,
IJET
, vol. 7, no. 2.8, pp. 680–683, Mar. 2018,
doi: 10.14419/ijet.v7i2.8.10556.