[1]
Sammie B Chalmers, “COMPARISON OF DIFFERENT SECURITY TOOLS TO DETECT RISKS IN NETWORKS”, IJECOM, vol. 1, no. 1, pp. 13–19, Jul. 2022.