1. Mohd, N., Singh, A., Bhadauria, H., Wazid, M.: An efficient node placement scheme to mitigate routing attacks in Internet of Battlefield Things’. Comput. Electr. Eng. 97, 107623 (2022)
2. Prajapati, S., Singh, A.: Cyber-Attacks on internet of things (IoT) devices, attack vectors, and remedies: a position paper. In: Verma, J.K., Saxena, D. (eds.) IoT and Cloud Computing for Societal Good, pp. 277–295. Springer, Cham (2022)
3. Parameshwari, M.V., Premkumar, M.P., Srinevasan, M.M., Logeswari, M.V., Junaid Rahman, P.V.: An intelligent bionic person for bomb detection and diffusion using internet of things (IoT) in military application. Int. J. Mech. Eng. 6(3), 1029–1038 (2021)
4. Ahmed, N.U.: Integrating machine learning in military intelligence process: study of futuristic approaches towards human-machine collaboration. Natl. Def. Coll. E-J. 2, 59–89 (2022)
5. Aziz, M.F., Khan, A.N., Shuja, J., Khan, I.A., Khan, F.G., Khan, A.U.R.: A lightweight and compromise-resilient authentication scheme for IoTs. Trans. Emerg. Telecommun. Technol. 33, e3813 (2019)