[1]
A. Al-Azzawi, “Towards the Security Analysis of the Five Most Prominent IPv4aaS Technologies”, Acta Tech. Jaurinensis, vol. 13, no. 2, pp. 85–98, Mar. 2020.