Search results

  • CSV Spreadsheet
  • RSS Feed
(21 - 34 of 34)
Reasoning about recognizability in security protocols
SECURING THE DATA STORAGE AND PROCESSING IN CLOUD COMPUTING ENVIRONMENT
SYSTEMATIC POLICY ANALYSIS AND MANAGEMENT
Security Code Review with Static Analysis Techniques for the Detection and Remediation of Security Vulnerabilities
Security Improvement in Cloud Computing Environment through Memory Analysis
Software-Defined Cyber Agility for Active Cyber Defense
Topology-aware approach for the emergence of social norms in multiagent systems
Toward a better understanding of viewers' perceptions of tag clouds: relative size judgment
Towards Adapting Cognitive Architectures for Knowledgeable & Personalized Dialogue Systems
Towards Multi-Party Conversation Modeling
Understanding and Designing for Sharing and Privacy in Wearable Fitness Platforms
Understanding and Designing for Sharing and Privacy in Wearable Fitness Platforms
Understanding the plight of Covid-19 Long Haulers through Computational Analysis         of YouTube Content
Using audience-centric design and community feedback to manage complex privacy settings