Return to Article Details Fuzzy Intrusion Detection Method and Zero-Knowledge Authentication for Internet of Things Networks Download Download PDF