

Author: Goldman Eric H.
Publisher: Emerald Group Publishing Ltd
ISSN: 0968-5227
Source: Information Management & Computer Security, Vol.20, Iss.5, 2012-11, pp. : 350-363
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content




Fuzzy logic decision making for multi-robot security systems
By Lee Malrey
Artificial Intelligence Review, Vol. 34, Iss. 2, 2010-08 ,pp. :






Journal of Information Technology Research (JITR), Vol. 2, Iss. 2, 2009-04 ,pp. :