Abstract
(2018). Vol. 5, No. 2, 2018. Journal of Computing and Security, 5(2), 59-89. doi: 10.22108/jcs.2018.24659
. "Vol. 5, No. 2, 2018", Journal of Computing and Security, 5, 2, 2018, 59-89. doi: 10.22108/jcs.2018.24659
(2018). 'Vol. 5, No. 2, 2018', Journal of Computing and Security, 5(2), pp. 59-89. doi: 10.22108/jcs.2018.24659
, "Vol. 5, No. 2, 2018," Journal of Computing and Security, 5 2 (2018): 59-89, doi: 10.22108/jcs.2018.24659
Vol. 5, No. 2, 2018. Journal of Computing and Security, 2018; 5(2): 59-89. doi: 10.22108/jcs.2018.24659