共 41 条
- [1] Aawadallah N., 2015, INT J RECENT INNOVAT, V3, P2393, DOI [10.17762/ijritcc2321-8169.1504133, DOI 10.17762/IJRITCC2321-8169.1504133]
- [2] Akbarabadi A., OVERVIEW METHODS DET, P6
- [3] Amara N., 2017, 2017 INT C CYB EN DI
- [4] Anitha R., 2013, DATA STORAGE SECURIT, P5
- [5] [Anonymous], 2012, International Journal of Future Computer and Communication
- [6] [Anonymous], EFFECTIVE RESOURCE M
- [7] [Anonymous], 2012, REP OPIN, DOI DOI 10.7537/MARSROJ041012.07
- [8] [Anonymous], INT C COMP COMM AUT
- [9] [Anonymous], OVERVIEW ATTACKS CLO
- [10] [Anonymous], 2010, INFORM SECURITY S AF, DOI DOI 10.1109/ISSA.2010.5588290