共 83 条
[2]
Ab Rahman NH, 2016, IEEE CLOUD COMPUT, V3, P50, DOI 10.1109/MCC.2016.5
[3]
Abhonkar P. D., 2012, International Journal of Computer Science and Information Technologies, V3, P5078
[4]
Adedayo O. M., 2015, TECH REP
[6]
Adedayo OluwasolaMary., 2012, International_Conference_on_Digital_Forensics_and Cyber_Crime, P220
[8]
Al-Dhaqm AMR, 2014, 2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), P322, DOI 10.1109/ISBAST.2014.7013142
[9]
Aldhaqm A., 2016, Research Journal of Applied Sciences, Engineering and Technology, V12, P386, DOI DOI 10.19026/RJASET.12.2377
[10]
Ali A., 2017, P INT C REL INF COMM, P141, DOI DOI 10.1007/978-3-319-59427-9_16