共 16 条
[1]
Abd Jalil K, 2010, INT CONF NETWORK INF, P221, DOI 10.1109/ICNIT.2010.5508526
[2]
[Anonymous], 2010, P 6 INT CONFERENCE P, DOI DOI 10.1145/1921168.1921179
[3]
Balkanli Eray, 2014, 2014 IEEE Symposium on Computational Intelligence in Cyber Security (CICS). Proceedings, P1, DOI 10.1109/CICYBS.2014.7013367
[5]
Daneshgadeh S., 2019, 2019 22 C INN CLOUDS
[6]
Ikram ST, 2017, J KING SAUD UNIV-COM, V29, P462, DOI 10.1016/j.jksuci.2015.12.004
[7]
Khuphiran P., 2018, 2018 22nd International Computer Science and Engineering Conference, P1, DOI DOI 10.1109/ICSEC.2018.8712757
[8]
Koay A, 2018, 2018 32ND INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), P162, DOI 10.1109/ICOIN.2018.8343104
[9]
Lai YK, 2020, ASIAPAC SIGN INFO PR, P1566