[1]
S. L. Spósito, “A Comprehensive Review of Techniques, Methods, Processes, Frameworks, and Tools for Privacy Requirements”, JISA, vol. 16, no. 1, pp. 508–529, Aug. 2025.