共 14 条
- [1] Alsaedi N., Hashim F., Sali A., Rokhani F.Z., Detecting sybil attacks in clustered wireless sensor networks based on energy trust system (ets), Computer Communications, 110, pp. 75-82, (2017)
- [2] Caux C., Pierreval H., Solving a hoist scheduling problem as a sequencing problem, IFAC Proceedings Volumes, 30, 19, pp. 315-319, (1997)
- [3] Chaouali W., Yahia I.B., Souiden N., The interplay of counter-conformity motivation, social influence, and trust in customers intention to adopt internet banking services: The case of an emerging country, Journal of Retailing and Consumer Services, 28, pp. 209-218, (2016)
- [4] De J.G.V., Almeida C.M., Rodrigues A., Ferreira E., Benoliel M.J., Cardoso V.V., Occurrence of pharmaceuticals in a water supply system and related human health risk assessment, Water Research, 72, pp. 199-208, (2015)
- [5] Gruyer D., Demmel S., Magnier V., Belaroussi R., Multi-hypotheses tracking using the dempstershafer theory, application to ambiguous road context, Information Fusion, 29, C, pp. 40-56, (2016)
- [6] Gupta P., Mehlawat M.K., Grover N., Intuitionistic fuzzy multi-attribute group decision-making with an application to plant location selection based on a new extended vikor method, Information Sciences, 370-371, pp. 184-203, (2016)
- [7] Kollar B., Weissova I., Siekelova A., Comparative analysis of theoretical aspects in credit risk models, Procedia Economics & Finance, 24, pp. 331-338, (2015)
- [8] Lin H.F., Determining the relative importance of mobile banking quality factors, Computer Standards & Interfaces, 35, 2, pp. 195-204, (2013)
- [9] Mahatanankoon P., Wen H.J., Lim B., Consumer-based m-commerce: Exploring consumer perception of mobile applications, Computer Standards & Interfaces, 27, 4, pp. 347-357, (2005)
- [10] Pal S., Moreira W., Extending cloud-based applications with mobile opportunistic networks: Security issues and privacy challenges, Pervasive Computing, pp. 445-481, (2016)