[1]
M. Aquino Cruz, M. Ibarra, W. Loayza Carrasco, E. IlasacaCahuata, J. A. Sotomayor Chahuaya, and A. Apaza-Tarqui, “Use of exploit for vulnerability detection of Linux Servers”, KEG, vol. 5, no. 1, pp. 138–149, Jan. 2020.