共 14 条
[1]
Al-Mahrouqi A, 2015, 2015 SCIENCE AND INFORMATION CONFERENCE (SAI), P1257, DOI 10.1109/SAI.2015.7237305
[2]
Baddar S. W. Al- Haj, 2016, SHORT COMMUNICATION
[5]
Design and Implementation of Network Forensic System Based on Intrusion Detection analysis
[J].
2012 INTERNATIONAL CONFERENCE ON CONTROL ENGINEERING AND COMMUNICATION TECHNOLOGY (ICCECT 2012),
2012,
:689-692
[7]
Olabelurin A, 2015, IEEE INT C NETW SENS, P315, DOI 10.1109/ICNSC.2015.7116055
[10]
Rostamipour M, 2015, 2015 5TH INTERNATIONAL CONFERENCE ON COMPUTER AND KNOWLEDGE ENGINEERING (ICCKE), P67, DOI 10.1109/ICCKE.2015.7365863