[1]
Y. Wang and B. Rawal, “Usability meets security: a database case study”, JACST, vol. 6, no. 2, pp. 33–39, Nov. 2017, doi: 10.14419/jacst.v6i2.8425.