共 47 条
[1]
[Anonymous], 2010, Technical report
[2]
[Anonymous], 2019, ENTROPY SWITZ, DOI DOI 10.3390/E21080720
[5]
Chen JG, 2011, LECT NOTES COMPUT SC, V7001, P32, DOI 10.1007/978-3-642-24861-0_3
[6]
Demirhan H., 2016, Istatistikciler Dergisi: Istatistik ve Aktuerya, V9, P1
[7]
Dhiman A., 2019, COMMUN COMPUT INF SC, V839, P308, DOI [10.1007/978-981-13-2372-0_27, DOI 10.1007/978-981-13-2372-0_27]
[8]
Duta B.C. A. C. L., 2014, International Journal on Cryptography and Information Security (IJCIS), V4, P31, DOI [10.5121/ijcis.2014.4103, DOI 10.5121/IJCIS.2014.4103]
[9]
Gorbenko I., 2019, Int. J. Comput, V18, P82, DOI [10.47839/ijc.18.1.1277, DOI 10.47839/IJC.18.1.1277]
[10]
Gorbenko I, 2017, 2017 4TH INTERNATIONAL SCIENTIFIC-PRACTICAL CONFERENCE PROBLEMS OF INFOCOMMUNICATIONS-SCIENCE AND TECHNOLOGY (PIC S&T), P207, DOI 10.1109/INFOCOMMST.2017.8246381