[1]
V. Kaviani J, P. A. Doval Amiri, F. Z. Brujeni, and N. Akhlaghi, “Modification data attack inside computer systems: A critical review”, Comput Sci Inf Technol, vol. 1, no. 3, pp. 98–105, Nov. 2020.