[1]
Makulova А., B. Sharipova2, M. . Othman, Pyrkova . А., and Оrdabayeva G., “Defection of operating system vulnerabilities and network traffic analysis methods”, JMMCS, vol. 121, no. 1, pp. 99–109, Apr. 2024.