Hu, J. ., Wu, W. ., Chuan, T. . and Peng, Q. . (2025) “Enterprise Internal Threat Authentication Traceability Technology Based on Key Authentication System”, Journal of Cyber Security and Mobility, 14(03), pp. 623–652. doi: 10.13052/jcsm2245-1439.1435.