共 50 条
- [22] Trust based Secure Routing Protocol using Fuzzy Logic in Wireless Sensor Networks [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (IEEE ICCIC), 2014, : 1264 - 1268
- [23] Secure Gamma Generation For Stream Cipher based on Fuzzy Logic [J]. 2020 VI INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND NANOTECHNOLOGY (IEEE ITNT-2020), 2020,
- [24] A Secure LOADng Routing Protocol Scheme Based Fuzzy Logic [J]. Informatica (Slovenia), 2024, 48 (18): : 139 - 148
- [25] Scatter Plots Based on Fuzzy Logic in Supporting the Design of Graphical Interfaces [J]. ARTIFICIAL INTELLIGENCE IN HCI, AI-HCI 2023, PT I, 2023, 14050 : 506 - 518
- [26] Water quality monitoring with fuzzy logic control based on graphical programming [J]. Ichsan, Mochammad Hannats Hanafi (hanas.hanafi@ub.ac.id), 1600, Universitas Ahmad Dahlan (14):
- [27] Minutia verification using fuzzy logic and geographic points of reference [J]. FUZZ-IEEE 2005: PROCEEDINGS OF THE IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS: BIGGEST LITTLE CONFERENCE IN THE WORLD, 2005, : 839 - 844
- [28] Secure Hash-Based Password Authentication Protocol Using Smartcards [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2011, PT V, 2011, 6786 : 593 - 606
- [29] Implementation and evaluations of graphical password using object-based image ranking [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2014, 29 (04): : 285 - 295
- [30] Implementation and evaluations of graphical password using object-based image ranking [J]. Comput Syst Sci Eng, 4 (285-295):