[1]
Serhiienko, A. 2012. Maliciously created hardware. Collection "Information Technology and Security". 1, 1 (Jun. 2012), 93–100. DOI:https://doi.org/10.20535/2411-1031.2012.1.1.53678.