Workshop on Modelling of Location Management in Mobile Information Systems (MLM 06)-Detection Methods for Executive Compressed Malicious Codes in Wire/Wireless Networks

In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 3981--1025 (2006)
  Copy   BIBTEX

Abstract

This article has no associated abstract. (fix it)

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 92,227

External links

  • This entry has no external links. Add one.
Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Network Management of Predictive Mobile Networks.Stephen Bush, Frost F., S. Victor, Joseph Evans & B. - 1999 - Journal of Network and Systems Management 7 (2).
Privacy in (mobile) telecommunications services.Jacques Penders - 2004 - Ethics and Information Technology 6 (4):247-260.
On qualitative modelling.Jarmo J. Ahonen - 1994 - AI and Society 8 (1):17-28.

Analytics

Added to PP
2014-01-28

Downloads
0

6 months
0

Historical graph of downloads

Sorry, there are not enough data points to plot this chart.
How can I increase my downloads?

Citations of this work

No citations found.

Add more citations

References found in this work

No references found.

Add more references