1 |
Insu Park, Jinkyu Lee, H. Raghav Rao, Shmbhu J. Upadhyaya, "Emerging Issues for Secure Knowledge Management-Results of Delphi Study," IEEE Trans., vol.36, no.3, pp.421-428, 2006.
|
2 |
A. Ferrari, G. Letac, J.-Y. Tourneret, "Exponential families of mixed Poisson distributions," Journal of Multivariate Analysis, volume 98, Issue 6, pp.1283-1292, 2007.
DOI
ScienceOn
|
3 |
S. Upadhyaya, H. R. Rao, and G. Padmanabhan, "Secure knowledge management," in Encyclopedia of Knowledge Management, E. D. Swartz, Ed. Hershey, PA: Idea Group Publishing, pp.795-801, 2005.
|
4 |
S. Xu and W. Zhang, "PBKM: A secure knowledge management framework," in Proc. Workshop Secure Knowledge Management (SKM), pp.207- 212, 2004.
|
5 |
Guofe Gu, Junjie Zhang, and Wenke Lee, "Botsniffer: Detecting Botnet Command and Control Channels in Network Traffic," Network&Distributed System Security Symposium, pp.269-286, 2008.
|
6 |
Bringer J., Chabanne H., and Dottax E., "HB++ : a Lightweight Authentication Protocol Secure Against Some Attacks," IEEE International Conference on Pervasive Services, Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing - SecPerU, 2006.
|