Search results

  • CSV Spreadsheet
  • RSS Feed
(1 - 12 of 12)
Assured Information Sharing for Ad-hoc Collaboration
Formal Techniques for Cyber Resilience: Modeling, Synthesis, and Verification
EXPLORING VARIED APPROACHES FOR COUNTERING THE PRIVACY AND SECURITY RISKS OF THIRD-PARTY MOBILE APPLICATIONS
Exploring the Perceptions of Users-as-Beacons Systems: Developing and Deploying Real-Life Prototypes
Essays on Exploitation and Exploration in Software Development
Secure Key Updates for Dynamically Reconfigurable Logic Locked Designs
Access Control Design and Implementation for Direct Memory Access Attack
SECURING MOBILE HYBRID APPLICATIONS THROUGH CONFIGURATIONS - FIRST LINE OF DEFENSE
Security Improvement in Cloud Computing Environment through Memory Analysis
Secure Key Updates for Dynamically Reconfigurable Logic Locked Designs
Secure RISCV Design for Side-Channel Evaluation Platform
The Use of Text Recognition, Lip Reading, and Object Detection for Protecting Sensitive Information from Shoulder Surfing Attacks