Search results
Journal of Hardware and Systems Security > 2019 > 3 > 3 > 235-249
Journal of Hardware and Systems Security > 2019 > 3 > 3 > 200-218
Neural Computing and Applications > 2019 > 31 > 1 > 23-34
Journal of Modern Power Systems and Clean Energy > 2018 > 6 > 3 > 438-448
International Journal of System Assurance Engineering and Management > 2019 > 10 > 4 > 475-483
International Journal of Information Technology > 2018 > 10 > 1 > 91-98
CSI Transactions on ICT > 2017 > 5 > 3 > 281-294
Lecture Notes in Computer Science > Artificial Intelligence and Computational Intelligence > Distributed AI and Agents > 608-618
Lecture Notes in Computer Science > Agent and Multi-Agent Systems: Technologies and Applications > Main Track 1: Methodological Aspects of Agent Systems > 122-131
Lecture Notes in Computer Science > Human Centered Design > Human Centered Design Methods and Tools > 101-109
Lecture Notes in Computer Science > Discovery Science > Short Papers > 291-296
IFIP — The International Federation for Information Processing > Building the Information Society > Fault Tolerance for Trustworthy and Dependable Information Infrastructures > 91-120
IFMBE Proceedings > XII Mediterranean Conference on Medical and Biological Engineering and Computing 2010 > Medical Imaging > 216-219
Communications in Computer and Information Science > Recent Trends in Network Security and Applications > First International Workshop on Trust Management in P2P Systems (IWTMP2PS 2010) P2P > 463-472
The International Library of Ethics, Law and Technology > Evaluating New Technologies > A Case Study: Ultrafast Communication > 21-34
Soft Computing > 2016 > 20 > 7 > 2677-2687
Annals of Operations Research > 2015 > 233 > 1 > 281-292
Wireless Networks > 2014 > 20 > 5 > 1037-1051
Wireless Personal Communications > 2013 > 70 > 1 > 189-205
Journal of the Brazilian Computer Society > 2012 > 18 > 1 > 61-80