[1]
“Automata-Based Approaches to Security Protocol Verification: A Comprehensive Survey Integrating Hybrid and Real-World Perspectives”, م ع ش, vol. 9, no. ملحق 36, pp. 398–405, Nov. 2025, doi: 10.65405/s3f5df65.