-
2
-
-
78951475039
-
Mission-driven robotic intelligent sensor agents for territorial security
-
R. Abielmona, E. Petriu, M. Harb, and S. Wesolkowski Mission-driven robotic intelligent sensor agents for territorial security IEEE Computational Intelligence Magazine 6 1 2011 55 67
-
(2011)
IEEE Computational Intelligence Magazine
, vol.6
, Issue.1
, pp. 55-67
-
-
Abielmona, R.1
Petriu, E.2
Harb, M.3
Wesolkowski, S.4
-
4
-
-
0031238209
-
The state of the art in electronic payment systems
-
N. Asokan, P. Janson, M. Steiner, and M. Waidner The state of the art in electronic payment systems Computer 30 1997 28 35 (Pubitemid 127672641)
-
(1997)
Computer
, vol.30
, Issue.9
, pp. 28-35
-
-
Asokan, N.1
Janson, P.A.2
Steiner, M.3
Waidner, M.4
-
5
-
-
77952188721
-
A fault-tolerant scheme for detection of DDoS attack patterns in cluster-based wireless sensor networks
-
Z.A. Baig, and A.I. Khan A fault-tolerant scheme for detection of DDoS attack patterns in cluster-based wireless sensor networks Sensor and AdHoc Networks: Theoretical and Algorithmic Aspects 2008 277 290
-
(2008)
Sensor and AdHoc Networks: Theoretical and Algorithmic Aspects
, pp. 277-290
-
-
Baig, Z.A.1
Khan, A.I.2
-
7
-
-
33744899083
-
Implementing a graph neuron array for pattern recognition within unstructured wireless sensor networks
-
DOI 10.1007/11596042-22, Embedded and Ubiquitous Computing - EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Proceedings
-
M. Baqer, A.I. Khan, and Z.A. Baig Implementing a graph neuron array for pattern recognition within unstructured wireless sensor networks Proceedings of the EUC workshops, Lecture notes in computer science vol. 3823 2005 208 217 (Pubitemid 43848697)
-
(2005)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.LNCS3823
, pp. 208-217
-
-
Baqer, M.1
Khan, A.I.2
Baig, Z.A.3
-
10
-
-
84858081167
-
-
Certificate authority
-
Certificate authority, 〈 http://en.wikipedia.org/wiki/Certificate- authority 〉.
-
-
-
-
12
-
-
4944265018
-
Data protection and data sharing in telematics
-
S. Duri, J. Elliott, M. Gruteser, X. Liu, P. Moskowitz, R. Perez, M. Singh, and J.-M. Tang Data protection and data sharing in telematics Journal of Mobile Networks and Applications 9 6 2004 693 701
-
(2004)
Journal of Mobile Networks and Applications
, vol.9
, Issue.6
, pp. 693-701
-
-
Duri, S.1
Elliott, J.2
Gruteser, M.3
Liu, X.4
Moskowitz, P.5
Perez, R.6
Singh, M.7
Tang, J.-M.8
-
14
-
-
0002410573
-
Agent-based telematic services and telecom applications
-
S. Fricke, K. Bsufka, J. Keiser, T. Schmidt, R. Sesseler, and S. Albayrak Agent-based telematic services and telecom applications Communications of the ACM 44 4 2001 43 48
-
(2001)
Communications of the ACM
, vol.44
, Issue.4
, pp. 43-48
-
-
Fricke, S.1
Bsufka, K.2
Keiser, J.3
Schmidt, T.4
Sesseler, R.5
Albayrak, S.6
-
23
-
-
57049155255
-
The impact of initial customer trust on intentions to transact with a web site: A trust building model
-
D. McKnight, V. Choudhury, and C. Kacmar The impact of initial customer trust on intentions to transact with a web site: a trust building model Journal of Strategic Information Systems 11 2002 297 323
-
(2002)
Journal of Strategic Information Systems
, vol.11
, pp. 297-323
-
-
McKnight, D.1
Choudhury, V.2
Kacmar, C.3
-
26
-
-
84858078665
-
The scalability of a multi-agent system in security services
-
R. Song, and L. Korba The scalability of a multi-agent system in security services National Research Council - Canada 2002 1 23
-
(2002)
National Research Council - Canada
, pp. 1-23
-
-
Song, R.1
Korba, L.2
-
28
-
-
45249117250
-
Multi-agent and intelligent agents techniques implemented in a control and supervisory telematic system
-
I. Stoian, T. Sanislav, D. Capatina, L. Miclea, H. Valean, and E. Sz Multi-agent and intelligent agents techniques implemented in a control and supervisory telematic system Proceedings of the automation, quality and testing, robotics 2006 463 468
-
(2006)
Proceedings of the Automation, Quality and Testing, Robotics
, pp. 463-468
-
-
Stoian, I.1
Sanislav, T.2
Capatina, D.3
Miclea, L.4
Valean, H.5
Sz, E.6
-
30
-
-
33746215223
-
Privacy and security shield for health information systems (e-health)
-
M. Ulieru, and D. Ionescu Privacy and security shield for health information systems International Journal of Computer Systems Science Engineering 21 3 2006 215 221 (Pubitemid 44099253)
-
(2006)
Computer Systems Science and Engineering
, vol.21
, Issue.3
, pp. 215-221
-
-
Ulieru, M.1
Ionescu, D.2
-
31
-
-
36348949050
-
A method of fraud & intrusion detection for E-payment systems in mobile e-Commerce
-
DOI 10.1109/PCCC.2007.358919, 4197955, 27th IEEE International Performance Computing and Communications Conference, IPCCC 07
-
P. Venkataram, B. Babu, M. Naveen, and G.S. Gungal A method of fraud and intrusion detection for e-payment systems in mobile E-commerce 21st IEEE international performance, computing, and communications conference, 2002 2007 395 401 (Pubitemid 350139322)
-
(2007)
Conference Proceedings of the IEEE International Performance, Computing, and Communications Conference
, pp. 395-401
-
-
Venkataram, P.1
Sathish Babu, B.2
Naveen, M.K.3
Samyama Gungal, G.H.4
-
32
-
-
84858081166
-
Comparing symmetric-key and public-key based security schemes in sensor networks: A case study of user access control
-
Beijing, China
-
Wang H, Sheng B, Tan CC, Li Q. Comparing symmetric-key and public-key based security schemes in sensor networks: a case study of user access control In: IEEE ICDCS, Beijing, China; 2008.
-
(2008)
IEEE ICDCS
-
-
Wang, H.1
Sheng, B.2
Tan, C.C.3
Li, Q.4
|