共 159 条
[1]
Accettura N, 2014, PROC IEEE INT SYMP, P1469, DOI 10.1109/ISIE.2014.6864831
[2]
Agah A., 2007, International Journal of Network Security, V5, P145
[4]
Al Zaid H., 2011, INT J ENG SCI TECHNO, V5, P93
[5]
Alajmi N. M., 2015, Int. J. Comput. Appl, V111, P27, DOI DOI 10.5120/19607-1472
[6]
Alam S., 2010, Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications (GreenCom) and Int'l Conference on Cyber, Physical and Social Computing (CPSCom), P488, DOI 10.1109/GreenCom-CPSCom.2010.116
[7]
Amouri A, 2015, IEEE LATAMER CONF
[8]
[Anonymous], 2000, P INT WORKSHOP SECUR, DOI DOI 10.1007/3-540-44810-122
[9]
[Anonymous], 1964, Plastics
[10]
[Anonymous], 2006, WIR MED ACC CONTR MA