[1]
2025. Methods for detection and analysis of misconfiguration-based attacks in cloud services. Information systems and technologies security. 1, 9 (Aug. 2025), 26–31. DOI:https://doi.org/10.17721/ISTS.2025.9.26-31.