(1)
ANALYSIS OF EXISTING THREATS AND VULNERABILITIES IN COMPUTER NETWORKS. Aca. Glo. Ind.Res. 2022, 3 (10), 53-56. https://doi.org/10.17605/OSF.IO/XVGRH.