Search results

  • CSV Spreadsheet
  • RSS Feed
(21 - 37 of 37)
More Efficient Learning in Traffic Grids Viewed as Complex Adaptive Systems Using Agent Based Modeling
PARTICIPANT SELECTION AND TASK ASSIGNMENT IN MOBILE CROWD SENSING
Photoplethysmographic Sensor-based Non-intrusive and Secure Smart Sensing and Applications
Privacy Preservation in Mobile Computing and Networking: Accessing, Sharing and Broadcasting
SECURING MOBILE HYBRID APPLICATIONS THROUGH CONFIGURATIONS - FIRST LINE OF DEFENSE
Security Assessment of Dynamic Spectrum Access in Emerging Wireless Networks
Security Code Review with Static Analysis Techniques for the Detection and Remediation of Security Vulnerabilities
Social and Location Based Routing in Delay Tolerant Networks
THROUGHPUT OPTIMIZATION FOR DATA COLLECTION IN WIRELESS SENSOR NETWORKS
TOWARDS AN AGENT-BASED APPROACH TO SIMULATING HUMANS FALLING FOR PHISHING ATTACKS
The Use of Text Recognition, Lip Reading, and Object Detection for Protecting Sensitive Information from Shoulder Surfing Attacks
Towards AI-Accelerated Volumetric Human Telepresence
Understanding and Designing for Sharing and Privacy in Wearable Fitness Platforms
Understanding and Designing for Sharing and Privacy in Wearable Fitness Platforms
User Centric Policy Management
Using formal methods towards improving cloud IaaS environments
Vulnerability Assessment and Policy Enforcement for Hybrid Mobile Applications