Пономаренко Роман
http://t.me/rerand0m
rerandom@ispras.ru




Dodiya B., Singh U. Malicious traffic analysis using Wireshark by collection of indicators of compromise //Int J Comput Appl. – 2022. – Т. 183. – С. 975-8887.
Jaya I. K. N. A., Dewi I. A. U., Mahendra G. S. Implementation of Wireshark Application in Data Security Analysis on LMS Website //Journal of Computer Networks, Architecture and High Performance Computing. – 2022. – Т. 4. – №. 1. – С. 79-86.
Afzal R., Murugesan R. K. Implementation of a Malicious Traffic Filter Using Snort and Wireshark as a Proof of Concept to Enhance Mobile Network Security //Journal of Telecommunications and Information Technology. – 2022. – №. 1.
Ahmad R. Z. N. et al. A NMAP AND WIRESHARK APPLICATION FOR DATA ANALYSIS AND NETWORK SECURITY //JComce-Journal of Computer Science. – 2023. – Т. 1. – №. 1.








Я не нашёл подходящей картинки, наслаждайтесь этой.