共 50 条
- [31] Mehmood Y, 2015, 2015 CONFERENCE ON INFORMATION ASSURANCE AND CYBER SECURITY (CIACS), P1, DOI 10.1109/CIACS.2015.7395559
- [32] Mishra P, 2016, 2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), P1211, DOI 10.1109/CCAA.2016.7813926
- [33] Modi C.N., 2012, 2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12), P1, DOI DOI 10.1109/ICCCNT.2012.6396086
- [34] Moorthy et M., 2013, International Journal of Engineering Technology, P0975
- [35] Mukkavilli SK, 2016, J INF SECUR, V7, P172, DOI DOI 10.4236/JIS.2016.73013
- [36] Nazarudin DAA, 2017, J FUNDAM APPL SCI, V9, P600, DOI 10.4314/jfas.v9i6s.45
- [37] Nikolai J, 2014, INT CONF COMPUT NETW, P989, DOI 10.1109/ICCNC.2014.6785472
- [39] Protic D.D., 2018, Vojnotehnicki glasnik/Military Tech. Courier, V66, P580, DOI [DOI 10.5937/VOJTEHG-66-16670, 10.5937/vojtehg66-16670]