共 50 条
- [21] Identity-Based Attack Detection in Mobile Wireless Networks [J]. 2011 PROCEEDINGS IEEE INFOCOM, 2011, : 1880 - 1888
- [22] Key management in IP-based mobile and wireless networks [J]. PDPTA '05: Proceedings of the 2005 International Conference on Parallel and Distributed Processing Techniques and Applications, Vols 1-3, 2005, : 1129 - 1134
- [24] Design of Mobile Robot Hand-Held Wireless Control Terminal System [J]. PROCEEDINGS OF THE 2017 2ND INTERNATIONAL CONFERENCE ON AUTOMATIC CONTROL AND INFORMATION ENGINEERING (ICACIE 2017), 2017, 119 : 173 - 175
- [26] Mobile terminal intrusion detection system based on intelligent agent [J]. GLOBAL MOBILE CONGRESS 2005, 2005, : 401 - 406
- [27] Mobile Intelligent Terminal Based Remote Monitoring and Management System [J]. 2012 THIRD CYBERCRIME AND TRUSTWORTHY COMPUTING WORKSHOP (CTC 2012), 2012, : 56 - 59
- [28] DESIGN AND IMPLEMENTATION OF AN ANOMALY-BASED INTRUSION DETECTION SYSTEM FOR WIRELESS INDUSTRIAL NETWORKS [J]. FIFTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER THEORY AND ENGINEERING (ICACTE 2012), 2012, : 879 - 886
- [29] Design and Implementation of Building Energy Monitoring and Management System based on Wireless Sensor Networks [J]. 2015 TENTH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS (ICCES), 2015, : 230 - 233
- [30] Design of lottery betting payment system based on mobile terminal [J]. INTERNATIONAL CONFERENCE ON MANAGEMENT OF E-COMMERCE AND E-GOVERNMENT, PROCEEDINGS, 2008, : 36 - 40