[1]
B. S Rawal, G. Eberhardt, and J. Lee, “Cybersecurity Snapshot: Google, Twitter, and Other Online Databases”, JACST, vol. 5, no. 1, pp. 14–22, May 2016, doi: 10.14419/jacst.v5i1.6181.