[1]
H. Wang, “Review on Trust Building Algorithms in IoT Security”, JISMAC, vol. 3, no. 4, pp. 326–337, Apr. 2022, doi: 10.36548/jismac.2021.4.004.