Mobile military security with concentration on unmanned aerial vehicles
暂无分享,去创建一个
[1] Matt Bishop,et al. Computer Security: Art and Science , 2002 .
[2] Audun Jøsang,et al. Security in Mobile Communications: Challenges and Opportunities , 2003, ACSW.
[3] Phillip R. Chandler,et al. UAV cooperative control , 2001, Proceedings of the 2001 American Control Conference. (Cat. No.01CH37148).
[4] William Stallings,et al. Network Security Essentials: Applications and Standards , 1999 .
[5] Hala ElAarag,et al. Improving TCP performance over mobile networks , 2002, CSUR.
[6] Peter Norvig,et al. Artificial Intelligence: A Modern Approach , 1995 .
[7] M. Pachter,et al. Complexity in UAV cooperative control , 2002, Proceedings of the 2002 American Control Conference (IEEE Cat. No.CH37301).
[8] William Stallings Zhu,et al. Network Security Essentials : Applications and Standards , 2007 .
[9] John F. MacGregor,et al. Proceedings of the American Control Conference , 1985 .
[10] T. C. Ting,et al. Information sharing and security in dynamic coalitions , 2002, SACMAT '02.
[11] Jonathan M. Roberts,et al. Flight control using an artificial neural network , 2000 .
[12] Christopher Bolkcom,et al. Unmanned Aerial Vehicles: Background and Issues for Congress , 2003 .