1 |
A. D'osta and A. M. Sayeed. Collaborative signal processing for distributed classification in sensor networks. In Proc. IPSN, Palo Alto, CA, 2003.
|
2 |
Adam Silberstein, Rebecca Braynard, Carla Ellis, Kamesh Munagala, and Jun Yang, 2006, A Sampling-Based Approach to Optimizing Top-k Queries in Sensor Networks, Data Engineering, 2006. ICDE '06. Proceedings of the 22nd International Conference on, pp. 68, 2006.
|
3 |
C. Moallemi and B. Van Roy, Distributed optimization in adaptive networks. In Proc. NIPS, Vancouver, BC, Canada, 2003.
|
4 |
Da Veiga A, Eloff JHP., An information security governance framework, Information Systems Management, Vol. 24, No. 4, pp. 361-372, 2007.
DOI
|
5 |
Jonggu Kang, Jaewhan Lim, Hongjoo Lee, Hangbae Chang, A Study on Classification of Information Asset Considering Business Process Characteristics for Small IT Service Organization, The Journal of Society for e-business Studies, vol. 16, No.4, pp. 97-108., 2011.
|
6 |
Ken H. Guo, Security-Related Behavior in Using Information Systems in the Workplace: A Review and Synthesis, Computer&Security, Vol. 32, pp. 242-251, 2013.
|
7 |
Martins A, Eloff JHP., Information security culture, IFIP/SEC2002. In: Security in the information society, Boston: Kluwer Academic, pp. 203-214, 2002.
|
8 |
Michael Rabbat and Robert Nowak, Distributed Optimization in Sensor Networks, IPSN '04 Proceedings of the 3rd international symposium on Information processing in sensor networks, pp. 20-27, 2004.
|
9 |
Mohamed Younis, Kemal Akkaya, Strategies and techniques for node placement in wireless sensor networks: A survey, Ad Hoc Networks, Vol. 6, Issue 4, pp. 621-655, 2008.
DOI
|
10 |
Niki Trigoni, Yong Yao, Alan Demers, Johannes Gehrke, Rajmohan Rajaraman, Multi-query Optimization for Sensor Networks, Vol. 3560, pp. 307-321, 2005.
|
11 |
Robbins S, Odendaal A, Roodt G., Organizational Behaviour - Global and Southern African perspectives, Cape Town: Pearson Education South Africa, 2003
|
12 |
Robert Nowak and Urbashi Mitra, Boundary Estimation in Sensor Networks: Theory and Methods, Lecture notes in computer science, Vol. 2634, pp. 80-95, 2003
|
13 |
Ruighaver AB, Maynard SB, Chang S. Organisational security, culture: extending the end-user perspective. Computers and Security, No. 26, pp. 56-62, 2007.
|
14 |
Kyoung-nam Kim, Lee, Jae Moon, Sunghyuck Hong, MyounJae Lee, Convergent Secure Wireless Sensor Network Routing Algorithm, Journal of the Korea Convergence Society, Vol. 6, No. 1, pp. 65-70, 2015.
DOI
|
15 |
Myung-Seong, Yim, Development of Measures of Information Security Policy Effectiveness To Maximize the Convergence Security, Journal of the Korea Convergence Society, Vol. 5, No. 4, pp. 27-32, 2014.
DOI
|