[1]
“Hacking in cyberspace and the best methods of protection”, jsd, vol. 2, no. 4, pp. 29–42, Jun. 2021, doi: 10.61212/jsd/26.