[1]
F.-C. BUTOI, “Study on Cyber-Attacks Based on E-mails”, IC3, vol. 1, pp. 67–72, Apr. 2014.