[1]
M.-F. MUŞAT, “Cyber Attacks and Information Systems Threats”, IC3, vol. 3, pp. 21–28, Apr. 2016.