Search results

  • CSV Spreadsheet
  • RSS Feed
(1 - 20 of 69)
A Holistic Approach to Securing Memory Error Vulnerabilities in IoT Firmware
A LANGUAGE-BASED APPROACH FOR SECURING ACTIONSCRIPT/FLASH VULNERABILITIES
A LANGUAGE-BASED APPROACH FOR SECURING ACTIONSCRIPT/FLASH VULNERABILITIES
A framework for user-centric privacy management in smartphones regarding Bluetooth Low Energy beacons
A framework for user-centric privacy management in smartphones regarding Bluetooth Low Energy beacons
AUTOMATIC UNIT TESTING TO DETECT SECURITY VULNERABILITIES IN WEB APPLICATIONS
AUTOMATIC UNIT TESTING TO DETECT SECURITY VULNERABILITIES IN WEB APPLICATIONS
An Approach Towards an Autonomic Computing Prototype Reference Architecture
An Approach Towards an Autonomic Computing Prototype Reference Architecture
Autonomous Malware Deception and Orchestration
Building an Efficient and Scalable Learning System on Heterogeneous Cluster
Deep Structured Learning in Medical Image Analysis
Deep Structured Learning in Medical Image Analysis
Developing Privacy Enhancing Technology For DNA Data Sharing In Public Genealogy Platforms
Discovering Zero-day Attacks By Leveraging Cyber Threat Intelligence
Discovering Zero-day Attacks By Leveraging Cyber Threat Intelligence
ENFORCING SECURITY POLICIES WITH DATA PROVENANCE TO ENRICH THE SECURITY OF IOT/ SMART BUILDING SYSTEM
ENFORCING SECURITY POLICIES WITH DATA PROVENANCE TO ENRICH THE SECURITY OF IOT/ SMART BUILDING SYSTEM
EXPLORING VARIED APPROACHES FOR COUNTERING THE PRIVACY AND SECURITY RISKS OF THIRD-PARTY MOBILE APPLICATIONS
EXPLORING VARIED APPROACHES FOR COUNTERING THE PRIVACY AND SECURITY RISKS OF THIRD-PARTY MOBILE APPLICATIONS