Qingtao, G. and Juyi, Z. (2026) “Exploration of Security Vulnerability Mining and Protection Technologies for Cloud Computing Platforms”, International Journal of Advance in Applied Science Research, 5(1), pp. 40–46. Available at: https://www.h-tsp.com/index.php/ijaasr/article/view/231 (Accessed: 5 February 2026).