Search results

  • CSV Spreadsheet
  • RSS Feed
(1 - 6 of 6)
Assured Information Sharing for Ad-hoc Collaboration
Assured Information Sharing for Ad-hoc Collaboration
BIO-INSPIRED CYBER SECURITY AND THREAT ANALYTICS
Clustering and Recommendation Techniques for Access Control Policy Management
Clustering and Recommendation Techniques for Access Control Policy Management
User-centric secure cross-site interaction framework for online social networking services