[1]
K. kongara and S. Krishnama, “A Process of Penetration Testing Using Various Tools”, Mesopotamian Journal of CyberSecurity, vol. 2023, pp. 93–103, Apr. 2023, doi: 10.58496/MJCS/2023/014.