Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
1
views
5
references
Top references
cited by
1
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,665
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Security and Privacy in Communication Networks
Hypernetworks of Complex Systems
other
Author(s):
Jeffrey Johnson
Publication date
(Print):
2009
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Journal of Systems Thinking
Most cited references
5
Record
: found
Abstract
: not found
Article
: not found
From cohomology in physics to q-connectivity in social science
R.H. Atkin
(1972)
0
comments
Cited
19
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Book
: not found
Mathematical structure in human affairs
RH Atkin
,
R.H. Atkin
,
RH Atkin
…
(1974)
0
comments
Cited
7
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Q-analysis: a theory of stars
J. JOHNSON
,
J.H. Johnson
,
J. Johnson
(1983)
0
comments
Cited
3
times
– based on
0
reviews
Review now
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2009
Pages
: 364-375
DOI:
10.1007/978-3-642-02466-5_35
SO-VID:
2e8cf4ef-e53b-435f-b97b-4fc1f78c9d05
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
The Impact of Persistence Length on the Communication Efficiency of Microtubules and CNTs
pp. 12
Towards Multimodal, Multi-party, and Social Brain-Computer Interfacing
pp. 15
Energy Management Using a Situational Awareness-Centric Ad-Hoc Network in a Home Environment
pp. 18
Analytical Foundation for Energy Efficiency Optimisation in Cellular Networks with Elastic Traffic
pp. 6
Games Keep You Forever Young in Mind and Body
pp. 27
A Simple Cost-Effective Framework for iPhone Forensic Analysis
pp. 33
Adaptive Activity and Context Recognition Using Multimodal Sensors in Smart Devices
pp. 27
Spatial Sounds (100dB at 100km/h) in the Context of Human Robot Personal Relationships
pp. 35
Automation of Variant Preparation and Solving Estimation of Algorithmic Tasks for Virtual Laboratories Based on Automata Model
pp. 47
Exploring User-Defined Gestures and Voice Commands to Control an Unmanned Aerial Vehicle
pp. 55
Reliable Acquisition of RAM Dumps from Intel-Based Apple Mac Computers over FireWire
pp. 69
Contrasting Permission Patterns between Clean and Malicious Android Applications
pp. 37
Data Storage Security Model for Cloud Computing
pp. 38
A Robustness Testing Method for Network Security
pp. 62
Windows Phone 7 from a Digital Forensics’ Perspective
pp. 62
How to Apply Gamification Techniques to Design a Gaming Environment for Algebra Concepts
pp. 67
Using Passenger Personas to Design Technological Innovation for the Rail Industry
pp. 118
A Conflict-Free Low-Jitter Guaranteed-Rate MAC Protocol for Base-Station Communications in Wireless Mesh Networks
pp. 142
An Eavesdropping Game with SINR as an Objective Function
pp. 44
FPAA Based on Integration of CMOS and Nanojunction Devices for Neuromorphic Applications
pp. 102
Egypt Local Government Websites Maturity: Current Status
pp. 121
Challenges and Opportunities for Embedded Computing in Retail Environments
pp. 129
Mobile Content Offloading in Database-Assisted White Space Networks
pp. 106
Using Support Vector Regression for Assessing Human Energy Expenditure Using a Triaxial Accelerometer and a Barometer
pp. 163
No-Reference H.264/AVC Statistical Multiplexing for DVB-RCS
pp. 172
Mobilewalla: A Mobile Application Search Engine
pp. 108
Entanglement Based Quantum Key Distribution Using a Bright Sagnac Entangled Photon Source
pp. 271
Tinder Me Softly – How Safe Are You Really on Tinder?
pp. 274
A Reference Architecture for Mobile Code Offload in Hostile Environments
pp. 183
Synchronization of Inhibitory Molecular Spike Oscillators
pp. 197
Analysis of Data from a Taxi Cab Participatory Sensor Network
pp. 270
Scalable Security Model Generation and Analysis Using k-importance Measures
pp. 85
A Biochemically-Engineered Molecular Communication System (Invited Paper)
pp. 107
Optical Networking in a Swarm of Microrobots
pp. 194
Investigating the Performance of Link Aggregation on OpenFlow Switches
pp. 205
SPICE Testbed: A DTN Testbed for Satellite and Space Communications
pp. 213
Channel Design and Optimization of Active Transport Molecular Communication
pp. 165
Tracking Small Artists
pp. 197
Monitoring and Control for Energy Efficiency in the Smart House
pp. 148
A Mathematical Model of Game Refinement
pp. 205
e-Labs and Work Objects: Towards Digital Health Economies
pp. 264
Interference Study of Micro Licensing for 5G Micro Operator Small Cell Deployments
pp. 351
Malicious or Selfish? Analysis of Carrier Sense Misbehavior in IEEE 802.11 WLAN
pp. 254
Wide–Weak Privacy–Preserving RFID Authentication Protocols
pp. 394
Rogue Access Point Detection Using Innate Characteristics of the 802.11 MAC
pp. 418
An Attribute-Based Signcryption Scheme to Secure Attribute-Defined Multicast Communications
pp. 198
The NOAH Project: Giving a Chance to Threatened Species in Africa with UAVs
pp. 265
Non-sufficient Memories That Are Sufficient for Prediction
pp. 305
Federating Wired and Wireless Test Facilities through Emulab and OMF: The iLab.t Use Case
pp. 363
Virtualized Application Networking Infrastructure
pp. 538
Using a 3D Geometrical Model to Improve Accuracy in the Evaluation and Selection of Countermeasures Against Complex Cyber Attacks
pp. 559
POSTER: API-Level Multi-policy Access Control Enforcement for Android Middleware
pp. 255
Can’t See the Forest: Using an Evolutionary Algorithm to Produce an Animated Artwork
pp. 459
Noisy Mean Field Game Model for Malware Propagation in Opportunistic Networks
pp. 364
Hypernetworks of Complex Systems
pp. 457
Open Urban Computing Testbed
pp. 516
Dynamic Spectrum Negotiation with Asymmetric Information
pp. 590
POSTER: Context-Adaptive User-Centric Privacy Scheme for VANET
pp. 559
A Comparison of 802.11a and 802.11p for V-to-I Communication: A Measurement Study
pp. 571
Analysis of Information Fusion for Low Cost, Precise and Reliable Vehicular Cooperative Positioning with DSRC
pp. 369
A Distributed Dynamic Mobility Architecture with Integral Cross-Layered and Context-Aware Interface for Reliable Provision of High Bitrate mHealth Services
pp. 484
Challenges in Gbps Wireless Optical Transmission
pp. 607
Cognitive Aware Interference Mitigation Scheme for LTE Femtocells
pp. 662
On the Application of a Novel Grouping Harmony Search Algorithm to the Switch Location Problem
pp. 631
Low Power Spatial Modulation Scheme for Wide Band Multiple Input and Multiple Output Wireless Communication Systems
pp. 2050
Community Identification in Directed Networks
pp. 1105
An Emergence Principle for Complex Systems
Similar content
2,665
Hypernetwork-based manufacturing service scheduling for distributed and collaborative manufacturing operations towards smart manufacturing
Authors:
Cheng
Hypernetwork approach to generating point clouds
Authors:
Przemysław Spurek
,
Sebastian Winczowski
,
Jacek Tabor
…
Stochastic hyperparameter optimization through hypernetworks
Authors:
Jonathan Lorraine
,
David Duvenaud
See all similar
Cited by
1
Hypernetworks for Policy Design in Systems of Systems of Systems
Authors:
Jeffrey Johnson
See all cited by