[1]
W. Okori and S. Buteraba, “Cyber Security Exploits and Management in Telecommunication Companies: The Case of Uganda”, JCSTS, vol. 6, no. 4, pp. 67–76, Oct. 2024, doi: 10.32996/jcsts.2024.6.4.10.