[1]
P. Chaudhary, “Mitigating Cyber Attacks Through Security Models and Networking Protocols”, Int. J. Comp. Sci. Eng., vol. 6, no. 8, pp. 925–929, Nov. 2025.