![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Author: Rasslan Mohamed Aslan Heba K.
Publisher: Inderscience Publishers
ISSN: 1747-8405
Source: International Journal of Security and Networks, Vol.8, Iss.4, 2013-12, pp. : 194-199
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
By Zhang Jianhong Xu Yuwei Zou Jiancheng
International Journal of Intelligent Information and Database Systems, Vol. 7, Iss. 5, 2013-09 ,pp. :
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)