[1]
“Forensics of Network Attacks: Analysis of Techniques, Simulations and Program Solutions for Protection”, SJEM, vol. 9, no. 2, Sep. 2024, doi: 10.5937/SJEM2402055S.