Hu, J. ., Wu, W. ., Chuan, T. ., & Peng, Q. . (2025). Enterprise Internal Threat Authentication Traceability Technology Based on Key Authentication System. Journal of Cyber Security and Mobility, 14(03), 623–652. https://doi.org/10.13052/jcsm2245-1439.1435