1.
Gligora T, Znika I. Implications of inadequate logging exploitation by malicious artificial intelligence agents. CMD [Internet]. 2025 May 16 [cited 2025 Jul. 1];. Available from: https://ojs.vvg.hr/index.php/DKU/article/view/728