共 15 条
- [1] AHMADI M, 2014, IEEE 5 CONTR SYST GR, P199
- [2] Al-Hasan Md, 2013, 2013 8th International Forum on Strategic Technology (IFOST), P2, DOI 10.1109/IFOST.2013.6616855
- [3] [Anonymous], 2012, P 8 INT ICST C SEC P
- [4] [Anonymous], FESTSCHRIFT JEAN JAC
- [5] Gilliam DP, 2004, LECT NOTES COMPUT SC, V3233, P296
- [6] Greene SariStern., 2006, Security Policies and Procedures
- [7] Kamara S, 2010, LECT NOTES COMPUT SC, V6054, P136, DOI 10.1007/978-3-642-14992-4_13
- [8] Moghaddam FF, 2014, IEEE REGION 10 SYMP, P508, DOI 10.1109/TENCONSpring.2014.6863086
- [9] Moghaddam FF, 2013, IEEE INT CONF CL NET, P185, DOI 10.1109/CloudNet.2013.6710575
- [10] MOGHADDAM FF, 2014, IEEE 5 CONTR SYST GR, P208