[1]
S. Sawyer, “Potential threats and mitigation tools for Network Attacks”, AJWTMS, vol. 1, Dec. 2022.