[1]
B. R. Koti and G. R. Kumar, “Information leakage detection and protection of leaked information by using the MAC-IP binding technique”, IJET, vol. 7, no. 1.7, pp. 230–235, Feb. 2018, doi: 10.14419/ijet.v7i1.7.10700.