[1]
P. Radha and G. Sireesha, “Security Test by using F T M and Data Allocation Strategies on Leakage Detection”, IJCT, vol. 4, no. 2, pp. 393–400, Aug. 2005.