R. Bhadauria, R. Chaki, N. Chaki, and S. Sanyal. (2011)cite arxiv:1109.5388
Comment: The paper is communicated to the IEEE Communications Surveys and
Tutorials.
C. Blackwell. Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies, page 45:1--45:4. New York, NY, USA, ACM, (2009)
K. Brancik, and G. Ghinita. Proceedings of the first ACM conference on Data and application security and privacy, page 231--236. New York, NY, USA, ACM, (2011)
S. Sanyal, A. Shelat, and A. Gupta. (2010)cite arxiv:1010.1938
Comment: 4 Pages, Invited Paper in VCON'10: 2nd Vaagdevi International
Conference on Information Technology for Real World Problems Vaagdevi College
of Engineering, Warangal, Andhra Pradesh, India, December 9-11, 2010.
K. Stoffel, and T. Studer. Database and Expert Systems Applications, volume 3588 of Lecture Notes in Computer Science, Springer, Berlin / Heidelberg, (2005)