[1]
S. Jan, S. U. Khan, A. Wahab, and Dr. Mohammad, “Access Restricted: A Study of Broken Access Control Vulnerabilities”, AAES, pp. 1–6, Mar. 2025, doi: 10.47852/bonviewAAES52024016.