(1)
Koti, B. R.; Kumar, G. R. Information Leakage Detection and Protection of Leaked Information by Using the MAC-IP Binding Technique. IJET 2018, 7 (1.7), 230-235. https://doi.org/10.14419/ijet.v7i1.7.10700.