[1]
Z. Cekerevac, Z. Dvorak, L. Prigoda, and P. Cekerevac, “Hacking, Protection and the Consequences of Hacking Hacking, Protection and the Consequences of Hacking ”, Communications, vol. 20, no. 2, pp. 83-87, Jun. 2018.