参考文献
|
-
Sun, M. T.,J. L. Hou(2003).The architecture and models for security reasoning in an EDMS.Journal of the Chinese Institute of Industrial Engineers,20(4),305-316.
連結:
-
Chang, H. Y.,R. Narayan,S. F. Wu,B. M. Vetter,X. Wang,M. Brown,J. J. Yuill,C. Sargor,F. Jou,F. Gong(1999).DECIDUOUS: Decentralized source identification for network-based intrusions.Proceedings of the Sixth IFIP/IEEE International Symposium on Integrated Network Management,701-714.
-
Chiu, C. H.(2001).The authority structure problem of computer supported collaborative concept mapping system for elementary students.Proceedings, IEEE International Conference on Advanced Learning Technologies,57-60.
-
Farkas, J.(1995).Towards classifying full-text using recurrent neural networks.Canadian Conference on Electrical and Computer Engineering,1,511-514.
-
Fernandez, I. B.,W. V. Subbarao(1994).Encryption based security for ISDN communication: Technique and application.Proceedings of the 1994 IEEE Creative Technology Transfer-A Global Affair,70-72.
-
Hall, M. J. J.(1996).A risk and control-oriented study of the practices of spreadsheet application developers.Proceedings of the Twenty-Ninth Hawaii International Conference on System Sciences,2,364-373.
-
Halliden, P. W.(1995).Security for distributed applications.European Convention on Security and Detection,156-160.
-
Hennig, A.,E. Marongiu,N. Sherkat,R. J. Whitrow(1997).DART-a software architecture for the creation of a distributed asynchronous recognition toolbox.Proceedings of the Fourth International Conference on Document Analysis and Recognition,1,439-443.
-
Huang, S. J.,C. L. Huang(1996).Improvement of classification accuracy by using enhanced query-based learning neural networks.IEEE International Conference on Neural Networks,1,398-402.
-
Karunadsa, P. S.,U. D. Annakkage,B. A. MacDonald(2000).Dynamic security control using secure regions derived from a decision tree technique.IEEE Power Engineering Society Summer Meeting,3,1861-1865.
-
Krulwich, B.(1995).Learning document category descriptions through the extraction of semantically significant phrases.The IJCAI Workshop on Data Engineering for Inductive Learning,1-10.
-
Lam, W.,K. F. Low(1997).Automatic document classification based on probabilistic reasoning: model and performance analysis.IEEE International Conference on Systems, Man, and Cybernetics, Computational Cybernetics and Simulation,3,2719-2723.
-
Lee, C. T.,J. W. Harris(1996).Designing a virtual access control configuration protocol for implementation over ISDN and shared-media networks.Proceedings, The 21st IEEE Conference on Local Computer Networks,116-125.
-
Leedham, G.,W. K. Tan,W. L. Yap(2001).Handwritten country name identification using vector quantisation and hidden Markov model.Proceedings, Sixth International Conference on Document Analysis and Recognition,685-688.
-
Li, B.,K. Dai,S. Zhang(2001).Virtual certificate authority for virtual enterprises.The Third International Workshop on Advanced Issues of E-Commerce and Web-Based Information Systems,222-224.
-
Lin, Z.,W. X. Shi,L. Wang(2000).A study and analysis on a high intensity public data encryption algorithm.Proceedings of the 3rd World Congress on Intelligent Control and Automation,4,2492-2494.
-
Loehr, L.(1995).Composing in groups: The concept of authority in cross functional project team work.IEEE Transactions on Professional Communication,38(2),83-94.
-
Parker, D. B.(1995).Using threats to demonstrate the elements of information security.European Convention on Security and Detection,11-17.
-
Piattini, M.,J. A. Rodero(1999).Auditing data warehouse security.Proceedings, IEEE 33rd Annual 1999 International Carnahan Conference on Security Technology,255-261.
-
Sailer, R.(1998).Security services in an open service environment.Proceedings of the 14th Annual Computer Security Applications Conference,223-234.
-
Schneck, P. A.,K. Schwan(1998).Dynamic authentication for high-performance networked applications.The Sixth International Workshop on Quality of Service,127-136.
-
Yip, K. W.,T. S. Ng(2000).Partial-encryption technique for intellectual property protection of FPGA-based products.IEEE Transactions on Consumer Electronics,46(1),183-190.
-
Zhang, Y.,Z. Xiong(2000).A MIS security strategy based on client/server architecture.Proceedings, the Fourth International Conference/Exhibition on High Performance Computing in the Asia-Pacific Region,2,676-677.
|