Secure transfer of environmental data to enhance human decision accuracy

[1]  Rudy Djamaluddin,et al.  Flexural Behavior of Styrofoam-Filled Concrete , 2016 .

[2]  Louis-Philippe Morency,et al.  It's only a computer: Virtual humans increase willingness to disclose , 2014, Comput. Hum. Behav..

[3]  Kashif Saleem,et al.  Empirical Studies of Bio-Inspired Self-Organized Secure Autonomous Routing Protocol , 2014, IEEE Sensors Journal.

[4]  K. Poulose Jacob,et al.  Energy Optimized Secure Routing Protocol for Wireless Sensor Networks , 2013 .

[5]  Mehmet A. Orgun,et al.  Efficient Random Key Based Encryption System for Data Packet Confidentiality in WSNs , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.

[6]  Yvonne Barnard,et al.  Learning to use new technologies by older adults: Perceived difficulties, experimentation behaviour and usability , 2013, Comput. Hum. Behav..

[7]  Raquel Benbunan-Fich,et al.  Self-interruptions in discretionary multitasking , 2013, Comput. Hum. Behav..

[8]  Kashif Saleem,et al.  Energy efficient information assured routing based on hybrid optimization algorithm for WSNs , 2013, 2013 10th International Conference on Information Technology: New Generations.

[9]  J. Bruinsma,et al.  World agriculture towards 2030/2050: the 2012 revision , 2012 .

[10]  Sungyoung Lee,et al.  Energy-Efficient Secure Path Algorithm for Wireless Sensor Networks , 2012, Int. J. Distributed Sens. Networks.

[11]  Tracey E. Rizzuto Age and technology innovation in the workplace: Does work context matter? , 2011, Comput. Hum. Behav..

[12]  Tsang-Long Pao,et al.  Segment-based emotion recognition from continuous Mandarin Chinese speech , 2011, Comput. Hum. Behav..

[13]  Norsheila Fisal,et al.  Secure real-time routing protocol with load distribution in wireless sensor networks , 2011, Secur. Commun. Networks.

[14]  Kashif Saleem,et al.  Biological inspired secure autonomous routing mechanism for wireless sensor networks , 2011, Int. J. Intell. Inf. Database Syst..

[15]  Kashif Saleem,et al.  An Intelligent Information Security Mechanism for the Network Layer of WSN: BIOSARP , 2011, CISIS.

[16]  Siba K. Udgata,et al.  Wireless Sensor Network Security Model Using Zero Knowledge Protocol , 2011, 2011 IEEE International Conference on Communications (ICC).

[17]  Saudi Arabia,et al.  Software Risk Management and Avoidance Strategy , 2011 .

[18]  Milena M. Head,et al.  Computer use by older adults: A multi-disciplinary review , 2010, Comput. Hum. Behav..

[19]  Basit Shahzad,et al.  Risk Mitigation And Management Scheme Based On Risk Priority , 2010 .

[20]  Poornima Madhavan,et al.  Effects of computer self-efficacy and system reliability on user interaction with decision support systems , 2010, Comput. Hum. Behav..

[21]  David J. Begley,et al.  Structure and function of the blood–brain barrier , 2010, Neurobiology of Disease.

[22]  M. Simkó,et al.  Can nanoparticles end up in the brain , 2010 .

[23]  Jurgen Müller,et al.  ERK5 and the regulation of endothelial cell function. , 2009, Biochemical Society transactions.

[24]  Kang Yen,et al.  Sensor network security: a survey , 2009, IEEE Communications Surveys & Tutorials.

[25]  Kashif Saleem,et al.  Proposed Nature Inspired Self-Organized Secure Autonomous Mechanism for WSNs , 2009, 2009 First Asian Conference on Intelligent Information and Database Systems.

[26]  Chae Hoon Lim LEAP++: A Robust Key Establishment Scheme for Wireless Sensor Networks , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.

[27]  Fang Liu,et al.  Real-Time Detection of Clone Attacks in Wireless Sensor Networks , 2008, 2008 The 28th International Conference on Distributed Computing Systems.

[28]  Bo Sheng,et al.  Comparing Symmetric-key and Public-key Based Security Schemes in Sensor Networks: A Case Study of User Access Control , 2008, 2008 The 28th International Conference on Distributed Computing Systems.

[29]  Yunseop Kim,et al.  Remote Sensing and Control of an Irrigation System Using a Distributed Wireless Sensor Network , 2008, IEEE Transactions on Instrumentation and Measurement.

[30]  Muhammad Tanvir Afzal,et al.  Enhanced Shell Sorting Algorithm , 2007 .

[31]  Brian P. Bailey,et al.  A framework for specifying and monitoring user tasks , 2006, Comput. Hum. Behav..

[32]  Choong Seon Hong,et al.  Security in wireless sensor networks: issues and challenges , 2006, 2006 8th International Conference Advanced Communication Technology.

[33]  L. Benes,et al.  Immune surveillance of the human central nervous system (CNS): Different migration pathways of immune cells through theblood–brain barrier and blood–cerebrospinal fluid barrier in healthy persons , 2006, Cytometry. Part A : the journal of the International Society for Analytical Cytology.

[34]  Ning Wang,et al.  Review: Wireless sensors in agriculture and food industry-Recent development and future perspective , 2006 .

[35]  Falko Dressler,et al.  Benefits of Bio-inspired Technologies for Networked Embedded Systems: An Overview , 2006, Organic Computing - Controlled Emergence.

[36]  Weisong Shi,et al.  Wireless Sensor Network Security: A Survey , 2006 .

[37]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[38]  Jacob W. Kijne,et al.  Unlocking the water potential of agriculture , 2003 .

[39]  H. Von Foerster,et al.  On Self-Organizing Systems and Their Environments , 2003 .

[40]  P. Klein,et al.  The use of computers in kindergarten, with or without adult mediation; effects on children's cognitive performance and behavior , 2000 .

[41]  M. Kemp,et al.  Spectacular Bodies: The Art and Science of the Human Body from Leonardo to Now , 2000 .

[42]  Gavin J. Swanson The Central Nervous System of Vertebrates , 1998, Trends in Neurosciences.

[43]  Ingvar Lundberg,et al.  Can computer speech support reading comprehension , 1993 .

[44]  Deanna Low,et al.  The use of microcomputer technology with persons unable to speak: An overview , 1988 .

[45]  M. Eigen,et al.  The Hypercycle: A principle of natural self-organization , 2009 .