[1]
Radha, P. and Sireesha, G. 2005. Security Test by using F T M and Data Allocation Strategies on Leakage Detection. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY. 4, 2 (Aug. 2005), 393–400. DOI:https://doi.org/10.24297/ijct.v4i2b1.3227.