Cited By
View all- Chatterjee SPattnaik LSatpathy S(2023)An Intrusion Detection System and Attack Intension Used in Network Forensic ExplorationIntelligent Systems and Machine Learning10.1007/978-3-031-35078-8_28(334-345)Online publication date: 10-Jul-2023
- Yuan MHuang Z(2018)Efficient Verification of Service-Based Applications for Flexible Modeling2018 IEEE International Conference on Services Computing (SCC)10.1109/SCC.2018.00020(97-104)Online publication date: Jul-2018
- Cao QJones DSheng H(2014)Contained nomadic information environmentsInformation and Management10.1016/j.im.2013.11.00751:2(225-239)Online publication date: 1-Mar-2014
- Show More Cited By