共 24 条
[1]
Abd Elminaam D.S., 2010, Int. J. Netw. Secur., V10, P216
[2]
Al-qdah M., 2007, Int. J. Comput. Sci. Secur, V1, P33
[3]
Alqadi Z., 2019, International Journal of Electrical and Computer Engineering, V9, P4092
[4]
[Anonymous], 2013, INT J ENG RES TECHNO
[5]
[Anonymous], 2010, International Journal of Network Security
[6]
Asad A, 2019, INT J MED RES HEALTH, V8, P50
[7]
Asok SB, 2013, 2013 INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND SIGNAL PROCESSING (ICCSP), P748, DOI 10.1109/iccsp.2013.6577156
[8]
Babu SG, 2013, IEEE SYM COMPUT INTE, P52, DOI 10.1109/CICYBS.2013.6597206
[9]
Gadanayak B., 2011, INT J COMPUT APPL, V26, P28
[10]
Gandhi R.A., 2014, INT J INNOV RES ADV, V1, P184