Probabilistic Approach for Location-Based Authentication
暂无分享,去创建一个
[1] Alex Acero,et al. Spoken Language Processing: A Guide to Theory, Algorithm and System Development , 2001 .
[2] Shigeo Abe DrEng. Pattern Classification , 2001, Springer London.
[3] Lawrence R. Rabiner,et al. A tutorial on Hidden Markov Models , 1986 .
[4] David G. Stork,et al. Pattern Classification , 1973 .
[5] Salvatore J. Stolfo,et al. Distributed data mining in credit card fraud detection , 1999, IEEE Intell. Syst..
[6] F. Zambonelli,et al. Spreading Pheromones in Everyday Environments through RFID Technology , 2005 .
[7] Lawrence R. Rabiner,et al. A tutorial on hidden Markov models and selected applications in speech recognition , 1989, Proc. IEEE.
[8] Jayashankar M. Swaminathan,et al. Modeling Supply Chain Dynamics: A Multiagent Approach , 1998 .
[9] Salvatore J. Stolfo,et al. Credit Card Fraud Detection Using Meta-Learning: Issues and Initial Results 1 , 1997 .
[10] R. C. Rose,et al. Keyword detection in conversational speech utterances using hidden Markov model based continuous speech recognition , 1995, Comput. Speech Lang..
[11] Sandra Dominikus,et al. Symmetric Authentication for RFID Systems in Practice , 2005 .
[12] Ari Juels,et al. RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.
[13] E. Amoroso. Intrusion Detection , 1999 .
[14] Luke Mirowski,et al. Detecting Clone Radio Frequency Identification Tags , 2006 .
[15] Elgar Fleisch,et al. Product specific security features based on RFID technology , 2006, International Symposium on Applications and the Internet Workshops (SAINTW'06).