[1]
A. K. Ghosh, “Criminals Infect More and More the IT Equipment”, ISC, vol. 30, no. 6, pp. 62–62, Nov. 2016.