Publisher
Springer Science and Business Media LLC
Reference19 articles.
1. Adi A, Etzion O (2004) Amit-the situation manager. VLDB J 13(2):177–203
2. Baxter K, Courage C, Caine K (2015) Understanding your users: a practical guide to user research methods. A volume in Interactive Technologies. Elsevier, ISBN: 978-0-12-800232-2
3. Bennett BT (2007) Understanding, assessing, and responding to terrorism: protecting critical infrastructure and personnel. Wiley, New York, ISBN: 978-0-471-77152-4
4. Bruzzone A, Tremori A, Massei M (2009) Serious games for training and education on defense against terrorism. Genoa Univ, Italy
5. Dymarski P (2011) Hidden markov models, theory and applications. InTech Open Access Publishers, Rijeka, p 326, ISBN 978-953-307-208-1
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Trusted Virtual Reality Environment for Training Security Officers;2023 19th International Conference on Distributed Computing in Smart Systems and the Internet of Things (DCOSS-IoT);2023-06