[1]
H. Jangravi, J. Aberoomand, and M. R. Arab Baferani, “Review of Research Methodology in the Field of Information Technology Security Governance Model”, JDTAI, vol. 3, no. 2, pp. 1–10, Jun. 2025, doi: 10.61838/dtai.3.2.15.