From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Credential Harvesting Using Man in the Middle Attack via Social Engineering. INTERNATIONAL JOURNAL OF TREND IN SCIENTIFIC RESEARCH AND DEVELOPMENT, 6 (3): 889-892 (марта 2022)Comparative Analysis of Phishing Tools. INTERNATIONAL JOURNAL OF TREND IN SCIENTIFIC RESEARCH AND DEVELOPMENT, 6 (2): 1451-1453 (февраля 2022)