[1]
“Adaptive Security and Modernization Strategies in Enterprise Java Applications: A Comparative Analysis of Legacy and Contemporary Authentication Frameworks”, eigmj, vol. 5, no. 1, pp. 113–119, Jan. 2026, Accessed: Mar. 15, 2026. [Online]. Available: https://grpublishing.net/index.php/eigmj/article/view/78