Possibility, A. (2018). DESIGN AND IMPLEMENTATION OF PROTOCOL SCRUBBING: NETWORK SECURITY THROUGH TRANSPARENT FLOW MODIFICATION. Afribary. Retrieved from https://tracking.afribary.com/works/design-and-implementation-of-protocol-scrubbing-network-security-through-transparent-flow-modification-133
Possibility, Aka "DESIGN AND IMPLEMENTATION OF PROTOCOL SCRUBBING: NETWORK SECURITY THROUGH TRANSPARENT FLOW MODIFICATION" Afribary. Afribary, 29 Jan. 2018, https://tracking.afribary.com/works/design-and-implementation-of-protocol-scrubbing-network-security-through-transparent-flow-modification-133. Accessed 10 Nov. 2024.
Possibility, Aka . "DESIGN AND IMPLEMENTATION OF PROTOCOL SCRUBBING: NETWORK SECURITY THROUGH TRANSPARENT FLOW MODIFICATION". Afribary, Afribary, 29 Jan. 2018. Web. 10 Nov. 2024. < https://tracking.afribary.com/works/design-and-implementation-of-protocol-scrubbing-network-security-through-transparent-flow-modification-133 >.
Possibility, Aka . "DESIGN AND IMPLEMENTATION OF PROTOCOL SCRUBBING: NETWORK SECURITY THROUGH TRANSPARENT FLOW MODIFICATION" Afribary (2018). Accessed November 10, 2024. https://tracking.afribary.com/works/design-and-implementation-of-protocol-scrubbing-network-security-through-transparent-flow-modification-133