Vulnerabilities In Computer Networks Research Articles