1.
Koti BR, Kumar GR. Information leakage detection and protection of leaked information by using the MAC-IP binding technique. IJET [Internet]. 2018 Feb. 5 [cited 2024 May 4];7(1.7):230-5. Available from: https://sciencepubco.com/index.php/ijet/article/view/10700