[1]
Osamah Ibrahim Mohammed Mohammed , Tran., “The Combination of Cyber Security, Excessive Programming, and Available Technology to Create an Effective Weapon”, IJESE, vol. 12, no. 11, pp. 23–30, Oct. 2024, doi: 10.35940/ijese.D4054.12111024.