Kaur, M., & Garg, P. (2022). A Review of Authentication Techniques used for Security in Cloud Computing. In (p. 187—191). http://doi.org/10.1109/PDGC56933.2022.10053251 (Original work published 2025)
Cambosuela, L., Kaur, M., & Astya, R. (2024). The Vulnerabilities and Risks of Implementing Internet of Things (IoT) in Cyber Security. In (p. 1—5). IEEE. http://doi.org/10.1109/ICRITO61523.2024.10522460 (Original work published 2025)