共 34 条
[2]
Anitha V., 2012, Int. J. Commun. Netw. Secur, V1, P5, DOI DOI 10.47893/IJCNS.2012.1042
[3]
Ankit K, 2016, INDIAN J SCI TECHNOL, V9, DOI [10.17485/ijst/2016/v9i22/95288, DOI 10.17485/ijst/2016/v9i22/95288]
[5]
Chen Yang, 2010, Proceedings of the Third International Joint Conference on Computational Sciences and Optimization (CSO 2010), P387, DOI 10.1109/CSO.2010.212
[7]
Dwivedi R., 2018, ARXIV PREPRINT ARXIV, P1805
[9]
Gaddam S V K, 2010, IJ NETWORK SECURITY, V11, P61