[1]
“A Review of Zero Trust Architecture in Protecting Critical Infrastructures”, JGRMS, vol. 1, no. 2, pp. 01–06, Apr. 2025, doi: 10.5281/zenodo.15245318.