[1]
D. kongara and S. Krishnama, “A Process of Penetration Testing Using Various Tools”, Mesopotamian Journal of CyberSecurity, vol. 2023, pp. 93–103, Apr. 2023.