1.
Boyanov P. USING A SPECIALIZED SOFTWARE FOR COMPREHENSIVE MONITORING THE SUSPICIOUS STATES IN COMPUTER NETWORKS: USING A SPECIALIZED SOFTWARE FOR COMPREHENSIVE MONITORING THE SUSPICIOUS STATES IN COMPUTER NETWORKS. JSAR [Internet]. 2023 Mar. 10 [cited 2025 Dec. 6];6(1):148-54. Available from: https://jsar.ftn.shu.bg/ojs-3.3.0-7/index.php/jsar/article/view/152