[1]
Saddam RA, “Sniffing and Spoofing in Computer Security”, IJIS, vol. 2, no. 6, pp. 869–874, Jun. 2023.