[1]
T. Gligora and I. Znika, “Implications of inadequate logging exploitation by malicious artificial intelligence agents”, CMD, May 2025.