[1]
K. P. K. et. al., “Symbiotic view of Provenance in Cyber Infrastrcuture and Information Security”, TURCOMAT, vol. 12, no. 2, pp. 3261–3267, Apr. 2021.