[1]
“Computer Network: An Implementation of MAC Spoofing ”,
int. jour. eng. com. sci
, vol. 12, no. 05, pp. 25717–25721, May 2023, doi:
10.18535/ijecs/v12i05.4733
.