[1]
Koti, B.R. and Kumar, G.R. 2018. Information leakage detection and protection of leaked information by using the MAC-IP binding technique. International Journal of Engineering & Technology. 7, 1.7 (Feb. 2018), 230–235. DOI:https://doi.org/10.14419/ijet.v7i1.7.10700.