[1]
A. Nachev, R. Ivanov, and G. ZHablianova, “Some approaches to lock malicious "traps" in the programs”, ITS, vol. 2, no. 1, pp. 76–78, Sep. 2013.