[1]
“Fases de un ataque a un Sistema Informático”, INF-FCPN-PGI, no. 7, pp. 52–55, Nov. 2021, Accessed: Jan. 19, 2026. [Online]. Available: https://ojs.umsa.bo/index.php/inf_fcpn_pgi/article/view/107