On an IT Security Framework
暂无分享,去创建一个
[1] Michael R. Genesereth,et al. Software agents , 1994, CACM.
[2] O. Sami Saydjari. Cyber defense: art to science , 2004, CACM.
[3] David A. Wagner,et al. Security in wireless sensor networks , 2004, SASN '04.
[4] Supersedes Cwa. EESSI Conformity Assessment Guidance - Part 2: Certification Authority services and processes , 2004 .
[5] L. O'Gorman,et al. Comparing passwords, tokens, and biometrics for user authentication , 2003, Proceedings of the IEEE.
[6] Timothy W. Finin,et al. KQML as an agent communication language , 1994, CIKM '94.
[7] Jeffrey M. Bradshaw,et al. An introduction to software agents , 1997 .
[8] Anil K. Jain,et al. Online script recognition , 2002, Object recognition supported by user interaction for service robots.
[9] Wanli Ma,et al. A Multiple Agents Based Intrusion Detection System , 2005, KES.
[10] Matthew C. Elder,et al. Recent worms: a survey and trends , 2003, WORM '03.
[11] Charles P. Pfleeger,et al. Security in computing , 1988 .
[12] Lakhmi C. Jain,et al. Knowledge-Based Intelligent Information and Engineering Systems , 2004, Lecture Notes in Computer Science.