al-turjman-f 1

1. Securing Edge Devices in IoT and 6G: A Trust-Based Approach for Resource-Constrained Environments
1