1.
Gligora T, Znika I. Implications of inadequate logging exploitation by malicious artificial intelligence agents. CMD [Internet]. 2025 May 16 [cited 2025 Oct. 14];. Available from: https://ocs.vvg.hr/index.php/DKU/article/view/728