1. Hassija, V., Chamola, V., Saxena, V., Jain, D., Goyal, P., Sikdar B.: A survey on IoT security: application areas, security threats, and solution architectures. IEEE Access (2019)
2. Jindal, M., Gupta, J., Bhushan, B.: Machine learning methods for IoT and their Future Applications. International 23 (2019)
3. Proceedings of International Conference on Artificial Intelligence and Applications. Springer Science and Business Media LLC (2021)
4. Albanesi, M.G., Ferretti, M., Guerrini, F.: A taxonomy for image authentication techniques and its application to the current state of the art. In: Proceedings 11th International Conference on Image Analysis and Processing, pp. 535–540. IEEE (2001)
5. Novo, O.: Blockchain meets IoT: an architecture for scalable access management in IoT. IEEE Internet Things J. 5(2), 1184–1195 (2018)