Search results

  • CSV Spreadsheet
  • RSS Feed
(1 - 11 of 11)
Access Control Design and Implementation for Direct Memory Access Attack
Assured Information Sharing for Ad-hoc Collaboration
EXPLORING VARIED APPROACHES FOR COUNTERING THE PRIVACY AND SECURITY RISKS OF THIRD-PARTY MOBILE APPLICATIONS
Essays on Exploitation and Exploration in Software Development
Exploring the Perceptions of Users-as-Beacons Systems: Developing and Deploying Real-Life Prototypes
SECURING MOBILE HYBRID APPLICATIONS THROUGH CONFIGURATIONS - FIRST LINE OF DEFENSE
Secure Key Updates for Dynamically Reconfigurable Logic Locked Designs
Secure Key Updates for Dynamically Reconfigurable Logic Locked Designs
Secure RISCV Design for Side-Channel Evaluation Platform
Security Improvement in Cloud Computing Environment through Memory Analysis
The Use of Text Recognition, Lip Reading, and Object Detection for Protecting Sensitive Information from Shoulder Surfing Attacks