[1]
Y. Wang and B. Rawal, “Usability meets security: a database case study”,
JACST
, vol. 6, no. 2, pp. 33–39, Nov. 2017,
doi: 10.14419/jacst.v6i2.8425.