Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference43 articles.
1. Abomhara, M., Gerdes, M., & Køien, G. M. (2015). A stride-based threat model for telehealth systems. Norsk informasjonssikkerhetskonferanse (NISK), 8(1), 82–96.
2. Amunts, K., Ebell, C., Muller, J., Telefont, M., Knoll, A., & Lippert, T. (2016). The human brain project: creating a european research infrastructure to decode the human brain. Neuron, 92(3), 574–581.
3. Barfield, W. (2015). Fundamentals of wearable computers and augmented reality. Boca Raton: CRC Press.
4. Barker, E. (2016). Recommendation for key management: Part 1: General. Special Publication 800-57, NIST, Gaithersburg, MD 20899–8930.
5. Biggio, B., Freeman, D., Miller, B., & Sinha, A. (2017). 10th international workshop on artificial intelligence and security (aisec 2017). In Proceedings of the 2017 ACM SIGSAC conference on computer and communications security (pp. 2621–2622). ACM.