[1]
A. M. . Kovacs, “Comparative Analysis of Traditional and Modern Proxy Solutions in Cyber Security”, Int. j. commun. netw. inf. secur., vol. 16, no. 2, Aug. 2024.