Hu, J. ., W. . Wu, T. . Chuan, and Q. . Peng. “Enterprise Internal Threat Authentication Traceability Technology Based on Key Authentication System”. Journal of Cyber Security and Mobility, vol. 14, no. 03, Aug. 2025, pp. 623–652, doi:10.13052/jcsm2245-1439.1435.