1.
Bernhard A, Hagi K. How a thief stole your data over network. Int. J. App. B. Inf. Systems [Internet]. 2018Jan.5 [cited 2024May17];1(2):13-8. Available from: http://pubs.ascee.org/index.php/ijabis/article/view/4