(1)
Koti, B. R.; Kumar, G. R. Information Leakage Detection and Protection of Leaked Information by Using the MAC-IP Binding Technique.
IJET
2018
,
7
(1.7), 230-235.
https://doi.org/10.14419/ijet.v7i1.7.10700
.