作 者:Haram Ahmed ;Aisha-Hassan A. Hashim ;Ismail El-azhary 等
出 处:International Journal of Computer Science and Network Security. 2014 ;14(12):6-8.
出 版 社:International Journal of Computer Science and Network Security
文 章 ID:186859862