[1]
“SIMULATING CYBERATTACKS IN A VIRTUAL ENVIRONMENT: A CASE STUDY IN THREAT DETECTION”, RRST-EE, vol. 71, no. 1, pp. 145–150, Mar. 2026, doi: 10.59277/RRST-EE.2026.1.24.