[1]
Bernhard, A. and Hagi, K. 2018. How a thief stole your data over network. International Journal of Applied Business and Information Systems. 1, 2 (Jan. 2018), 13–18. DOI:https://doi.org/10.31763/ijabis.v1i2.4.