[1]
“Criminal Law Protection of Information Systems”, KT, vol. 2, no. 3-4, pp. 271–294, Oct. 2002, Accessed: Aug. 15, 2025. [Online]. Available: https://www.krimteme.fkn.unsa.ba/index.php/kt/article/view/515