[1]
Y. Bohdanova, T. Chorna, and S. Malakhov, “Overview of the current state of threats caused by the influence of exploits”, CS&CS E-journal, no. 2, pp. 35-40, Dec. 2022.