Works matching IS 20782489 AND DT 2016 AND VI 7 AND IP 2
Results: 17
Using Proven Reference Monitor Patterns for Security Evaluation.
- Published in:
- Information (2078-2489), 2016, v. 7, n. 2, p. 23, doi. 10.3390/info7020023
- By:
- Publication type:
- Article
An Approach to the Match between Experts and Users in a Fuzzy Linguistic Environment.
- Published in:
- Information (2078-2489), 2016, v. 7, n. 2, p. 22, doi. 10.3390/info7020022
- By:
- Publication type:
- Article
On-Body Smartphone Localization with an Accelerometer.
- Published in:
- Information (2078-2489), 2016, v. 7, n. 2, p. 21, doi. 10.3390/info7020021
- By:
- Publication type:
- Article
User in the Loop: Adaptive Smart Homes Exploiting User Feedback--State of the Art and Future Directions.
- Published in:
- Information (2078-2489), 2016, v. 7, n. 2, p. 35, doi. 10.3390/info7020035
- By:
- Publication type:
- Article
Implementation Support of Security Design Patterns Using Test Templates.
- Published in:
- Information (2078-2489), 2016, v. 7, n. 2, p. 34, doi. 10.3390/info7020034
- By:
- Publication type:
- Article
A Framework for Measuring Security as a System Property in Cyberphysical Systems.
- Published in:
- Information (2078-2489), 2016, v. 7, n. 2, p. 33, doi. 10.3390/info7020033
- By:
- Publication type:
- Article
Speech Compression.
- Published in:
- Information (2078-2489), 2016, v. 7, n. 2, p. 32, doi. 10.3390/info7020032
- By:
- Publication type:
- Article
Efficient Dynamic Integrity Verification for Big Data Supporting Users Revocability.
- Published in:
- Information (2078-2489), 2016, v. 7, n. 2, p. 31, doi. 10.3390/info7020031
- By:
- Publication type:
- Article
Geospatially Constrained Workflow Modeling and Implementation.
- Published in:
- Information (2078-2489), 2016, v. 7, n. 2, p. 30, doi. 10.3390/info7020030
- By:
- Publication type:
- Article
Measuring Knowledge Management Performance in Organizations: An Integrative Framework of Balanced Scorecard and Fuzzy Evaluation.
- Published in:
- Information (2078-2489), 2016, v. 7, n. 2, p. 29, doi. 10.3390/info7020029
- By:
- Publication type:
- Article
Computer-Aided Identification and Validation of Privacy Requirements.
- Published in:
- Information (2078-2489), 2016, v. 7, n. 2, p. 28, doi. 10.3390/info7020028
- By:
- Publication type:
- Article
Feature Engineering for Recognizing Adverse Drug Reactions from Twitter Posts.
- Published in:
- Information (2078-2489), 2016, v. 7, n. 2, p. 27, doi. 10.3390/info7020027
- By:
- Publication type:
- Article
The Potential of Three Computer-Based Communication Activities for Supporting Older Adult Independent Living.
- Published in:
- Information (2078-2489), 2016, v. 7, n. 2, p. 26, doi. 10.3390/info7020026
- By:
- Publication type:
- Article
A Specification-Based IDS for Detecting Attacks on RPL-Based Network Topology.
- Published in:
- Information (2078-2489), 2016, v. 7, n. 2, p. 25, doi. 10.3390/info7020025
- By:
- Publication type:
- Article
Super-Activation as a Unique Feature of Secure Communication in Malicious Environments.
- Published in:
- Information (2078-2489), 2016, v. 7, n. 2, p. 24, doi. 10.3390/info7020024
- By:
- Publication type:
- Article
A Big Network Traffic Data Fusion Approach Based on Fisher and Deep Auto-Encoder.
- Published in:
- Information (2078-2489), 2016, v. 7, n. 2, p. 20, doi. 10.3390/info7020020
- By:
- Publication type:
- Article
Minimax Duality for MIMO Interference Networks.
- Published in:
- Information (2078-2489), 2016, v. 7, n. 2, p. 19, doi. 10.3390/info7020019
- By:
- Publication type:
- Article