Search results

  • CSV Spreadsheet
  • RSS Feed
(1 - 12 of 12)
The Use of Text Recognition, Lip Reading, and Object Detection for Protecting Sensitive Information from Shoulder Surfing Attacks
Security Improvement in Cloud Computing Environment through Memory Analysis
Secure RISCV Design for Side-Channel Evaluation Platform
Secure Key Updates for Dynamically Reconfigurable Logic Locked Designs
Secure Key Updates for Dynamically Reconfigurable Logic Locked Designs
SECURING MOBILE HYBRID APPLICATIONS THROUGH CONFIGURATIONS - FIRST LINE OF DEFENSE
Formal Techniques for Cyber Resilience: Modeling, Synthesis, and Verification
Exploring the Perceptions of Users-as-Beacons Systems: Developing and Deploying Real-Life Prototypes
Essays on Exploitation and Exploration in Software Development
EXPLORING VARIED APPROACHES FOR COUNTERING THE PRIVACY AND SECURITY RISKS OF THIRD-PARTY MOBILE APPLICATIONS
Assured Information Sharing for Ad-hoc Collaboration
Access Control Design and Implementation for Direct Memory Access Attack