[1]
Zubairuddin Mohammed, “Understanding Insider Threats: A Comprehensive Technical Analysis”, JCSTS, vol. 7, no. 12, pp. 349–354, Dec. 2025, doi: 10.32996/jcsts.2025.7.12.44.