[1]
N. M. Hewahi, “A Security Technique for Censor Production Rules-based Systems”, KEG, vol. 3, no. 7, pp. 1–10, Oct. 2018.