1.
The Combination of Cyber Security, Excessive Programming, and Available Technology to Create an Effective Weapon. IJESE [Internet]. 2024 Oct. 30 [cited 2024 Nov. 21];12(11):23-30. Available from: https://journals.blueeyesintelligence.org/index.php/ijese/article/view/522