[1]
A. GABOR, “Top 10 Vulnerabilities of Computer Networks”, IC3, vol. 2, pp. 21–26, Apr. 2015.