[1]
“ANALYSIS OF EXISTING THREATS AND VULNERABILITIES IN COMPUTER NETWORKS”, Aca. Glo. Ind.Res., vol. 3, no. 10, pp. 53–56, Oct. 2022, doi: 10.17605/OSF.IO/XVGRH.