[1]
I.-A. BUCULEI, “Information Systems Vulnerabilities”, IC3, vol. 4, pp. 39–48, Apr. 2017.