Editorial
Abstract
(2014). Vol. 6, No. 2, 2019. Journal of Computing and Security, 1(1), 43-80. doi: 10.22108/jcs.2019.24648
. "Vol. 6, No. 2, 2019", Journal of Computing and Security, 1, 1, 2014, 43-80. doi: 10.22108/jcs.2019.24648
(2014). 'Vol. 6, No. 2, 2019', Journal of Computing and Security, 1(1), pp. 43-80. doi: 10.22108/jcs.2019.24648
, "Vol. 6, No. 2, 2019," Journal of Computing and Security, 1 1 (2014): 43-80, doi: 10.22108/jcs.2019.24648
Vol. 6, No. 2, 2019. Journal of Computing and Security, 2014; 1(1): 43-80. doi: 10.22108/jcs.2019.24648