[1]
H. Jangravi, J. Aberoomand, and M. R. Arab Baferani, “Review of Research Methodology in the Field of Information Technology Security Governance Model”, JDTAI, vol. 3, no. 2, pp. 1–10, Jun. 2025, Accessed: Aug. 13, 2025. [Online]. Available: https://journaldtai.com/index.php/jdtai/article/view/178