Publisher
Springer Berlin Heidelberg
Reference7 articles.
1. Lai, C.-F., Ma, Y.-W., Chang, S.-Y., Chao, H.-C., Huang, Y.-M.: OSGi-based services architecture for Cyber-Physical Home Control Systems. Computer Communications, 1–8, in Press, Corrected Proof, Available online April 2, 2010 (2010)
2. Cagalaban, G.A., So, Y., Kim, S.: SCADA Network Insecurity: Securing Critical Infrastructures through SCADA Security Exploitation. Journal of Security Engineering 6(6), 473–482 (2008)
3. Ko, H., Freitas, C., Goreti, M., Ramos, C.: A study on Users Authentication Methods for Safety Group Decision System in Dybanic Small Group. Journal of Convergence Information Technology 4(4), 68–76 (2009)
4. Krumm, J.: A survey of computational location privacy. Pervasive Ubiquitous Computing (13), 391–399 (2009)
5. Bradley, N.A., Dunlop, M.D.: Toward a Multidisciplinary Model of Context to Support Context-Aware Computing. Human-Computer Interaction 20, 403–446 (2005)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献