(1)
, M. K. A. G. P. V. K. V. C. S. Data Leakage Detection Using Fake Data for Identifying Guilty Agents. IJRITCC 2016, 4, 536-539.