[1]
Kaviani J, V. et al. 2020. Modification data attack inside computer systems: A critical review. Computer Science and Information Technologies. 1, 3 (Nov. 2020), 98–105. DOI:https://doi.org/10.11591/csit.v1i3.pp98-105.