共 16 条
[1]
Bhalke DG, 2014, 2014 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND INTEGRATED NETWORKS (SPIN), P40, DOI 10.1109/SPIN.2014.6776918
[2]
Choudhury M.A.A.S., 2002, 15 TRIENN WORLD C BA, P1
[3]
Eichhoff Markus, 2012, CHALLENGES INTERFACE, P371
[4]
Essid S., 2006, ICASSP
[5]
A Security Architecture for Intranet Based on Security Area Division
[J].
2010 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY AND SECURITY INFORMATICS (IITSI 2010),
2010,
:539-543
[6]
Goshvarpour Ateke, 2012, IRAN J PSYCHIAT BEHA, V6
[7]
Hall Glenn Eric, 2012, 11 INT C INF SCI SIG, P1039
[8]
Hall M., 2009, SIGKDD Explorations, V11, P10, DOI DOI 10.1145/1656274.1656278
[10]
Lashari S. A., 2012, 2012 Proceedings of International Conference on Computer & Information Science (ICCIS 2012), P94, DOI 10.1109/ICCISci.2012.6297219