[1]
I. Paráda and A. Tóth, “Possible Scenario for Malware Exploit Investigation with Data-Driven Architecture”, HM, vol. 17, no. 4, pp. 153–174, Mar. 2023.