<Record><identifier xmlns="http://purl.org/dc/elements/1.1/">URN:NBN:SI:DOC-XVT5W7AK</identifier><date>2025</date><creator>Sedlar, Urban</creator><relation>documents/doc/X/URN_NBN_SI_doc-XVT5W7AK_001.pdf</relation><relation>documents/doc/X/URN_NBN_SI_doc-XVT5W7AK_001.txt</relation><format format_type="issue">1/2</format><format format_type="volume">92</format><format format_type="type">article</format><format format_type="extent">str. 1-12</format><identifier identifier_type="ISSN">0013-5852</identifier><identifier identifier_type="COBISSID_HOST">238971395</identifier><identifier identifier_type="URN">URN:NBN:SI:doc-XVT5W7AK</identifier><language>slv</language><publisher publisher_location="Ljubljana">Elektrotehniška zveza Slovenije</publisher><source>Elektrotehniški vestnik</source><rights>InC</rights><subject language_type_id="eng">attack vectors</subject><subject language_type_id="eng">cyber security</subject><subject language_type_id="slv">kibernetska varnost</subject><subject language_type_id="eng">malware</subject><subject language_type_id="eng">reverse engineering</subject><subject language_type_id="slv">vektorji okužbe</subject><subject language_type_id="slv">vzvratni inženiring</subject><subject language_type_id="slv">zlonamerna programska oprema</subject><title>Zlonamerna programska oprema – trendi, mehanizmi in primeri</title></Record>