[1]
S. Singh, S. Singh, and B. K. Gupta, “Comparative Analysis of Information Security Pillars”, matrix, vol. 3, no. 2, pp. 5-8, Oct. 2015.