[1]
Hu, J. , Wu, W. , Chuan, T. and Peng, Q. 2025. Enterprise Internal Threat Authentication Traceability Technology Based on Key Authentication System. Journal of Cyber Security and Mobility. 14, 03 (Aug. 2025), 623–652. DOI:https://doi.org/10.13052/jcsm2245-1439.1435.