1.
Boyanov P. USING A SPECIALIZED SOFTWARE FOR COMPREHENSIVE MONITORING THE SUSPICIOUS STATES IN COMPUTER NETWORKS: USING A SPECIALIZED SOFTWARE FOR COMPREHENSIVE MONITORING THE SUSPICIOUS STATES IN COMPUTER NETWORKS. JSAR [Internet]. 2023 Mar. 10 [cited 2024 Nov. 22];6(1):148-54. Available from: https://jsar.ftn.shu.bg/ojs-3.3.0-7/index.php/jsar/article/view/152