[1]
I. Paráda and A. Tóth, “The Properties of Metasploit in the Mirror of a Secured FTP Daemon Exploit”, HM, vol. 15, no. 3, pp. 219–230, Feb. 2021.