Search results for: B. Hoda Helmi
Lecture Notes in Computer Science > Computational Intelligence in Security for Information Systems > Chapter 5: Applications of Intelligent Methods for Security > 285-292
International Journal of Applied Mathematics and Computer Science > 2014 > 24 > 3 > 621-633