Possibility, A. (2018). DESIGN AND IMPLEMENTATION OF PROTOCOL SCRUBBING: NETWORK SECURITY THROUGH TRANSPARENT FLOW MODIFICATION. Afribary. Retrieved from https://track.afribary.com/works/design-and-implementation-of-protocol-scrubbing-network-security-through-transparent-flow-modification-133
Possibility, Aka "DESIGN AND IMPLEMENTATION OF PROTOCOL SCRUBBING: NETWORK SECURITY THROUGH TRANSPARENT FLOW MODIFICATION" Afribary. Afribary, 29 Jan. 2018, https://track.afribary.com/works/design-and-implementation-of-protocol-scrubbing-network-security-through-transparent-flow-modification-133. Accessed 18 Dec. 2024.
Possibility, Aka . "DESIGN AND IMPLEMENTATION OF PROTOCOL SCRUBBING: NETWORK SECURITY THROUGH TRANSPARENT FLOW MODIFICATION". Afribary, Afribary, 29 Jan. 2018. Web. 18 Dec. 2024. < https://track.afribary.com/works/design-and-implementation-of-protocol-scrubbing-network-security-through-transparent-flow-modification-133 >.
Possibility, Aka . "DESIGN AND IMPLEMENTATION OF PROTOCOL SCRUBBING: NETWORK SECURITY THROUGH TRANSPARENT FLOW MODIFICATION" Afribary (2018). Accessed December 18, 2024. https://track.afribary.com/works/design-and-implementation-of-protocol-scrubbing-network-security-through-transparent-flow-modification-133