[1]
Serhiienko, A. 2012. Maliciously created hardware. Information Technology and Security. 1, 1 (Jun. 2012), 93–100. DOI:https://doi.org/10.20535/2411-1031.2012.1.1.53678.