al-turjman-f 1
1.
Securing Edge Devices in IoT and 6G: A Trust-Based Approach for Resource-Constrained Environments
1