[1]
W. Tang, “An Analysis of the Application of Computer Information Management Technology in Network Security”, JTPMS, vol. 5, no. 5, pp. 6–11, Jun. 2025.