[1]
R. Lakhani and R. C. Sachan, “Securing Wireless Networks Against Emerging Threats: An Overview of Protocols and Solutions”, J. Sci. Tech., vol. 5, no. 4, pp. 132–158, Oct. 2024, doi: 10.55662/JST.2024.5406.