1.
Makulova А, Sharipova2 B, Othman M, Pyrkova А, Оrdabayeva G. Defection of operating system vulnerabilities and network traffic analysis methods. JMMCS [Internet]. 2024 Apr. 5 [cited 2024 Oct. 12];121(1):99-109. Available from: https://bm.kaznu.kz/index.php/kaznu/article/view/1386