[1]
S. . Chandrakar, S. Siddharth, and A. . Thomas, “Assessing Vulnerability Detection Tools for Authentication”, Int J Intell Syst Appl Eng, vol. 12, no. 18s, pp. 765–772, Mar. 2024.