[1]
R. I. . et. al., “Security Exploitation for Online Meeting Applications: Proof of Concept”, TURCOMAT, vol. 12, no. 8, pp. 1785–1792, Apr. 2021.