IEEE International Conference on Intelligence and Security Informatics (ISI 2010)
2009 ◽
Vol 1
(3)
◽
pp. 29-29