共 49 条
- [1] Alkhateeb F., Al Maghayreh E., Aljawarneh S., A multi agent-based system for securing university campus: Design and architecture, 2010 International Conference on Intelligent Systems, Modelling and Simulation, pp. 75-79, (2010)
- [2] Amoroso E., Kwapniewski R., A selection criteria for intrusion detection systems, Computer Security Applications Conference, Proceedings, 14th Annual, 7-11 Dec 1998, pp. 280-288, (1998)
- [3] Ayoade J., Roadmap to solving security and privacy concerns in RFID systems, Computer Law and Security Report, 23, 6, pp. 555-561, (2007)
- [4] Aziz Z., Anumba C.J., Ruikar D., Carrillo P.M., Bouchlaghem D.N., Semantic web based services for intelligent mobile construction collaboration, ITcon, 9, Special Issue Mobile Computing in Construction, pp. 367-379, (2003)
- [5] Bai Y., Kobayashi H., Intrusion detection systems: Technology and development, Advanced Information Networking and Applications, AINA 2003, 17th International Conference, pp. 710-715, (2003)
- [6] Batina L., Guajardo J., Kerins T., Mentens N., Tuyls P., Verbauwhede I., Public-key cryptography for RFID-tags, Proceedings - Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2007, pp. 217-222, (2007)
- [7] Beer W., Christian V., Modeling context-aware behavior by interpreted ECA rules, Proceedings of the International Conference on Parallel and Distributed Computing (EUROPAR'03), pp. 26-29, (2003)
- [8] Bolotnyy L., Robins G., Physically unclonable function-based security and privacy in RFID systems, 2007 Fifth Annual IEEE International Conference on Pervasive Computing and Communications, pp. 211-220, (2007)
- [9] Burmester M., Medeiros B., RFID security: Attacks, countermeasures and challenges', the 5th RFID Academic Convocation, The RFID Journal Conference, (2007)
- [10] Choi S.H., Poon C.H., An RFID-based anti-counterfeiting system, IAENG International Journal of Computer Science, 35, 1, pp. 1-12, (2008)