[1]
M. A. N. Shamsudin and M. F. Zolkipli, “A Comparative Analysis of Penetration Testing Tools for Network Vulnerability Assessment”, bij, vol. 8, no. 2, pp. 69-80, Jul. 2025.