Qingtao, G. and Juyi, Z. (2026) “Exploration of Security Vulnerability Mining and Protection Technologies for Cloud Computing Platforms”, International Journal of Advance in Applied Science Research, 5(1), pp. 40–46. Available at: https://h-tsp.com/index.php/ijaasr/article/view/231 (Accessed: 4 February 2026).