共 42 条
[1]
Aabed MA, 2007, ICSPC: 2007 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATIONS, VOLS 1-3, PROCEEDINGS, P756
[2]
Adnan G., 2010, Bahria University Journal of Information Communication Technology, V3, P68
[3]
Agarwal M., 2013, International Journal of Network Security & Its Applications, V5, P91, DOI DOI 10.5121/IJNSA.2013.5107
[4]
Ahmadoh Esraa Mohammad, 2015, Lecture Notes on Information Theory, V3, P42, DOI 10.18178/lnit.3.1.42-47
[6]
Al-Juaid N.A., 2018, J Inf Secur Cybercrimes Res (JISCR), V1, P8, DOI [10.26735/16587790.2018.006, DOI 10.26735/16587790.2018.006]
[7]
Al-Nofaie S., 2016, J COMPUT SCI COMPUTA, V6, P59, DOI 10.20967/jcscm.2016.03.004
[8]
Al-Nofaie S., 2016, P 3 INT C MATH SCI C, P38
[10]
Al-Qurashi A., 2018, J COMPUTER SCI COMPU, V8, P87, DOI [10.20967/jcscm.2018.04.006, DOI 10.20967/JCSCM.2018.04.006]