[1]
A. Bernhard and K. Hagi, “How a thief stole your data over network”, Int. J. App. B. Inf. Systems, vol. 1, no. 2, pp. 13–18, Jan. 2018.