ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Atlantis Ambient and Pervasive Intelligence - Trustworthy Ubiquitous Computing
Latest Publications
TOTAL DOCUMENTS
12
(FIVE YEARS 0)
H-INDEX
2
(FIVE YEARS 0)
Published By Atlantis Press
9789491216701, 9789491216718
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Mitigation of Wormhole Attack in Wireless Sensor Networks
Atlantis Ambient and Pervasive Intelligence - Trustworthy Ubiquitous Computing
◽
10.2991/978-94-91216-71-8_7
◽
2012
◽
pp. 109-147
◽
Cited By ~ 1
Author(s):
Ali Modirkhazeni
◽
Norafida Ithnin
◽
Mohammed M. Kadhum
◽
Teddy Mantoro
Keyword(s):
Wireless Sensor Networks
◽
Sensor Networks
◽
Wireless Sensor
◽
Wormhole Attack
Start Chat
Download Full-text
Reasoning of Collaborative Human Behaviour in Security-CriticalWork Practices: A Framework
Atlantis Ambient and Pervasive Intelligence - Trustworthy Ubiquitous Computing
◽
10.2991/978-94-91216-71-8_6
◽
2012
◽
pp. 99-106
◽
Cited By ~ 2
Author(s):
Geong Sen Poh
◽
Nik Nailah Abdullah
◽
Muhammad Reza Z’aba
◽
Mohamed Ridza Wahiddin
Keyword(s):
Human Behaviour
Start Chat
Download Full-text
Protocol for Secure Access in Mobile Ad-hoc Network for Emergency Services Using Group Based Access Control Model
Atlantis Ambient and Pervasive Intelligence - Trustworthy Ubiquitous Computing
◽
10.2991/978-94-91216-71-8_8
◽
2012
◽
pp. 149-173
Author(s):
Asmidar Abu Bakar
◽
Roslan Ismail
◽
Abdul Rahim Ahmad
◽
Jamalul-lail Abdul Manan
Keyword(s):
Access Control
◽
Ad Hoc Network
◽
Ad Hoc
◽
Mobile Ad Hoc Network
◽
Emergency Services
◽
Control Model
◽
Access Control Model
◽
Secure Access
◽
Mobile Ad Hoc
Start Chat
Download Full-text
Trusted Log Management System
Atlantis Ambient and Pervasive Intelligence - Trustworthy Ubiquitous Computing
◽
10.2991/978-94-91216-71-8_5
◽
2012
◽
pp. 79-98
Author(s):
Akihiro Tomono
◽
Minoru Uehara
◽
Yuji Shimada
Keyword(s):
Management System
◽
Log Management
Start Chat
Download Full-text
Network Forensics: Detection and Mitigation of Botnet Malicious Code via Darknet
Atlantis Ambient and Pervasive Intelligence - Trustworthy Ubiquitous Computing
◽
10.2991/978-94-91216-71-8_4
◽
2012
◽
pp. 65-78
Author(s):
R. Azrina
◽
R. Othman
◽
Normaziah A. Aziz
◽
M. ZulHazmi
◽
M. Khazin
◽
...
Keyword(s):
Malicious Code
◽
Network Forensics
Start Chat
Download Full-text
A Virtual Performance Stage as a Space for Children to Create and Perform Stories
Atlantis Ambient and Pervasive Intelligence - Trustworthy Ubiquitous Computing
◽
10.2991/978-94-91216-71-8_3
◽
2012
◽
pp. 39-61
Author(s):
Wahju Agung Widjajanto
◽
Heidi Schelhowe
◽
Michael Lund
Start Chat
Download Full-text
The Automatic Trust Management of Self-Adaptive Multi-Display Environments
Atlantis Ambient and Pervasive Intelligence - Trustworthy Ubiquitous Computing
◽
10.2991/978-94-91216-71-8_1
◽
2012
◽
pp. 3-20
◽
Cited By ~ 3
Author(s):
Karin Bee
◽
Stephan Hammer
◽
Christian Pratsch
◽
Elisabeth Andre
Keyword(s):
Trust Management
◽
Self Adaptive
Start Chat
Download Full-text
A Lightweight Graph-Based Pattern Recognition Scheme in Mobile Ad Hoc Networks
Atlantis Ambient and Pervasive Intelligence - Trustworthy Ubiquitous Computing
◽
10.2991/978-94-91216-71-8_9
◽
2012
◽
pp. 177-206
Author(s):
R. A. Raja Mahmood
◽
A. H. Muhamad Amin
◽
Amiza Amir
◽
Asad I. Khan
Keyword(s):
Pattern Recognition
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Mobile Ad Hoc
◽
Hoc Networks
Start Chat
Download Full-text
Malicious Pixels Using QR Codes as Attack Vector
Atlantis Ambient and Pervasive Intelligence - Trustworthy Ubiquitous Computing
◽
10.2991/978-94-91216-71-8_2
◽
2012
◽
pp. 21-38
◽
Cited By ~ 9
Author(s):
Peter Kieseberg
◽
Sebastian Schrittwieser
◽
Manuel Leithner
◽
Martin Mulazzani
◽
Edgar Weippl
◽
...
Keyword(s):
Qr Codes
Start Chat
Download Full-text
Privacy Preserving with a Purpose-Based Privacy Data Graph
Atlantis Ambient and Pervasive Intelligence - Trustworthy Ubiquitous Computing
◽
10.2991/978-94-91216-71-8_12
◽
2012
◽
pp. 249-267
◽
Cited By ~ 1
Author(s):
Yuan Tian
◽
Biao Song
◽
Eui-Nam Huh
Keyword(s):
Privacy Preserving
◽
Data Graph
Start Chat
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close