[1]
“Methods for detection and analysis of misconfiguration-based attacks in cloud services”, БІСТ, vol. 1, no. 9, pp. 26–31, Aug. 2025, doi: 10.17721/ISTS.2025.9.26-31.