[1]
Sunmathi R, Tharun Teja G, Lakshmanaprakash S, and Abirami A, “An Analysis of Verification Systems and Cybersecurity Dangers”, JCSCS, vol. 3, no. 1, pp. 23–29, Apr. 2024.