Search results

  • CSV Spreadsheet
  • RSS Feed
(1 - 11 of 11)
Access Control Design and Implementation for Direct Memory Access Attack
Assured Information Sharing for Ad-hoc Collaboration
EXPLORING VARIED APPROACHES FOR COUNTERING THE PRIVACY AND SECURITY RISKS OF THIRD-PARTY MOBILE APPLICATIONS
Essays on Exploitation and Exploration in Software Development
Exploring the Perceptions of Users-as-Beacons Systems: Developing and Deploying Real-Life Prototypes
Formal Techniques for Cyber Resilience: Modeling, Synthesis, and Verification
SECURING MOBILE HYBRID APPLICATIONS THROUGH CONFIGURATIONS - FIRST LINE OF DEFENSE
Secure Key Updates for Dynamically Reconfigurable Logic Locked Designs
Secure Key Updates for Dynamically Reconfigurable Logic Locked Designs
Security Improvement in Cloud Computing Environment through Memory Analysis
The Use of Text Recognition, Lip Reading, and Object Detection for Protecting Sensitive Information from Shoulder Surfing Attacks