[1]
Nachev, A., Ivanov, R. and ZHablianova, G. 2013. Some approaches to lock malicious "traps" in the programs. Collection "Information Technology and Security". 2, 1 (Sep. 2013), 76–78. DOI:https://doi.org/10.20535/2411-1031.2013.2.1.58565.