共 50 条
- [1] A novel approach to visualize web anomaly attacks in pervasive computing environment JOURNAL OF SUPERCOMPUTING, 2013, 65 (01): : 301 - 316
- [2] Environment Objects: A Novel Approach for Modeling Privacy in Pervasive Computing AMBIENT ASSISTIVE HEALTH AND WELLNESS MANAGEMENT IN THE HEART OF THE CITY, PROCEEDING, 2009, 5597 : 166 - 173
- [3] Attacks on and Countermeasures for an RFID Mutual Authentication Scheme in Pervasive Computing Environment KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2011, 5 (09): : 1684 - 1697
- [4] An evolutionary system development approach in a pervasive computing environment 2004 INTERNATIONAL CONFERENCE ON CYBERWORLDS, PROCEEDINGS, 2004, : 194 - 199
- [5] A Novel Anomaly Detection Approach for Mitigating Web-based Attacks against Clouds 2015 IEEE 2ND INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD), 2015, : 289 - 294
- [6] Covert Channel Attacks in Pervasive Computing 2015 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS (PERCOM), 2015, : 236 - 242
- [7] A developing approach of information acquisition system in pervasive computing environment 2006 IEEE International Conference on Information Acquisition, Vols 1 and 2, Conference Proceedings, 2006, : 840 - 844
- [8] Web caching in a Pervasive Computing world 6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL IV, PROCEEDINGS: MOBILE/WIRELESS COMPUTING AND COMMUNICATION SYSTEMS I, 2002, : 102 - 107
- [10] Task computing - The semantic web meets pervasive computing SEMANTIC WEB - ISWC 2003, 2003, 2870 : 866 - 881