[1]
A.-G. NICOLAE, “Types of Software Attacks Against Electronic Data”, IC3, vol. 4, pp. 57–64, Apr. 2017.