[1]
T. Pavan Kumar, B. Eswar, P. Ayyappa Reddy, and D. Sindhu Bhargavi, “An efficient fog computing for comprising approach to avoid data theft attack”, IJET, vol. 7, no. 2.8, pp. 680–683, Mar. 2018, doi: 10.14419/ijet.v7i2.8.10556.