[1]
“Simulation of IP Network Attacks in a Controlled Environment Using Packet Generation and Manipulation Tools”, Revista Ciencias de Seguridad y Defensa, vol. 9, no. 02, p. 16, Feb. 2025, doi: 10.24133/RCSD.VOL09.N02.2024.03.