Q Yi, S Xiong, B Wang, S Yi - International Journal of Industrial Ergonomics, 2020 - Elsevier
Under existing network security technology, it is still possible for hackers to impersonate
legitimate users and invade a system for malicious destruction. Therefore, this study …