Search results

  • CSV Spreadsheet
  • RSS Feed
(1 - 19 of 19)
A framework for user-centric privacy management in smartphones regarding Bluetooth Low Energy beacons
A framework for user-centric privacy management in smartphones regarding Bluetooth Low Energy beacons
Automated formal analytics for smart grid security and resiliency
Automated formal analytics for smart grid security and resiliency
Cyber Agility for Attack Deterrence and Deception
Cyber Agility for Attack Deterrence and Deception
Cyber Agility for Attack Deterrence and Deception
EXPLORING VARIED APPROACHES FOR COUNTERING THE PRIVACY AND SECURITY RISKS OF THIRD-PARTY MOBILE APPLICATIONS
EXPLORING VARIED APPROACHES FOR COUNTERING THE PRIVACY AND SECURITY RISKS OF THIRD-PARTY MOBILE APPLICATIONS
EXPLORING VARIED APPROACHES FOR COUNTERING THE PRIVACY AND SECURITY RISKS OF THIRD-PARTY MOBILE APPLICATIONS
Integrating Random Linear Code Based Encryption Scheme Rlce Algorithm Into Post-quantum Openssl
SECURING THE DATA STORAGE AND PROCESSING IN CLOUD COMPUTING ENVIRONMENT
SECURING THE DATA STORAGE AND PROCESSING IN CLOUD COMPUTING ENVIRONMENT
Security Code Review with Static Analysis Techniques for the Detection and Remediation of Security Vulnerabilities
Security Code Review with Static Analysis Techniques for the Detection and Remediation of Security Vulnerabilities
User Centric Policy Management
User Centric Policy Management
VISUAL ANALYTICS IN HIGH-DIMENSIONAL DATA WITH DICHOTOMOUS OUTCOME
VISUAL ANALYTICS IN HIGH-DIMENSIONAL DATA WITH DICHOTOMOUS OUTCOME