[1]
A. Nachev, R. Ivanov, and G. ZHablianova, “Method of hidden "trap" for starting malicious code”, ITS, vol. 2, no. 1, pp. 72–75, Sep. 2013.