[1]
“Zero Trust Architecture: Rethinking Perimeter-Based Security Models”, IJITCE, vol. 12, no. 2, pp. 899–903, May 2024, doi: 10.62647/.