共 29 条
[1]
Abiodun M.K., 2021, Artificial Intelligence for Cyber Security: Methods, Issues and Possible Horizons or Opportunities, P189
[3]
Agrawal M., 2012, INT J ENG ADV TECHNO, V1 no, P79
[4]
Alanazi H., 2010, ARXIV
[5]
[Anonymous], 2013, 2013 15 INT C ADV CO
[6]
Aumasson J.-P., 2017, Serious Cryptography: A Practical Introduction to Modern Encryption
[7]
Barona R., 2017, P 2017 INT C CIRCUIT, P1
[8]
Secure knowledge management: Confidentiality, trust, and privacy
[J].
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS,
2006, 36 (03)
:429-438
[9]
Christina L., 2014, INT J INNOV RES COMP, V2, P5009
[10]
Using a Modified Approach of Blowfish Algorithm for Data Security in Cloud Computing
[J].
PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: IOT AND SMART CITY (ICIT 2018),
2018,
:157-162