共 14 条
[1]
Abdul-Raham A., 1998, PROC 1997 WORKSHOP N, P48
[2]
Abowd G. D., 2000, ACM Transactions on Computer-Human Interaction, V7, P29, DOI 10.1145/344949.344988
[3]
[Anonymous], 2004, P 27 AUSTRALASIAN C
[4]
[Anonymous], P 7 INT WORKSH SEC P
[6]
Towards an intrusion detection system for pervasive computing environments
[J].
ITCC 2005: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 2,
2005,
:277-282
[7]
Kong JJ, 2001, NETWORK PROTOCOLS, P251, DOI 10.1109/ICNP.2001.992905
[8]
Self-securing ad hoc wireless networks
[J].
ISCC 2002: SEVENTH INTERNATIONAL SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, PROCEEDINGS,
2002,
:567-574
[9]
SUN H, 2004, P IEEE CAN C COMP EL
[10]
WEISE J, 2001, SUN BLUEPRINTS O AUG