共 43 条
[1]
Abuseta Y., 2015, Int. J. Softw. Eng. Appl., V6, P11, DOI [10.5121/ijsea.2015.6402, DOI 10.5121/IJSEA.2015.6402]
[2]
Ahuja K, 2014, PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON ISSUES AND CHALLENGES IN INTELLIGENT COMPUTING TECHNIQUES (ICICT), P471, DOI 10.1109/ICICICT.2014.6781328
[3]
[Anonymous], 2015, COMMON VULNERABILITY
[4]
[Anonymous], 2014, INT C REC ADV INN EN
[5]
[Anonymous], 2001, AUTONOMIC COMPUTING
[6]
Atighetchi M., 2014, CSIAC, V2, P20
[7]
PKI-based security for peer-to-peer information sharing
[J].
FOURTH INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING, PROCEEDINGS,
2004,
:45-52
[8]
Bonanno F, 2014, 2014 INTERNATIONAL SYMPOSIUM ON POWER ELECTRONICS, ELECTRICAL DRIVES, AUTOMATION AND MOTION (SPEEDAM), P1077, DOI 10.1109/SPEEDAM.2014.6872127
[10]
da Silva Bezerra Romildo Martins, 2009, Journal of Networks, V4, P495, DOI 10.4304/jnw.4.6.495-504