共 13 条
[1]
Bhattacharyya S., 2012, International Journal of Computer Network and Information Security, V4, P27, DOI [DOI 10.5815/IJCNIS.2012.07.04, DOI 10.5815/IJCNIS2012.07.04]
[3]
Chen P.Y., 2006, INT J APPL SCI ENG, V4, P275, DOI DOI 10.6703/IJASE/2006.4(3).275
[5]
Mahjabin T, 2012, INT CONF COMPUT INFO, P168, DOI 10.1109/ICCITechn.2012.6509770
[6]
Masud Karim S. M., 2011, 2011 14th International Conference on Computer and Information Technology (ICCIT), P286, DOI 10.1109/ICCITechn.2011.6164800
[7]
Paul G., 2012, INT C INF SYST SEC, P134, DOI 10.1007/978-3-642-35130-3_10
[8]
Reddy V. Lokeswara, 2011, International Journal of Advanced Networking and Applications, V2, P868
[9]
Verma Avushi, 2013, INT J COMPUT SCI BUS, V1
[10]
[No title captured]