[1]
“ETHICAL HACKING”, csecurity, vol. 2, no. 1, pp. 8–15, May 2019, doi: 10.14421/csecurity.2019.2.1.1418.