Return to Article Details An Efficient Amalgamation of Computational Models to Ensure a Secure IoT Environment Download Download PDF