Search results

  • CSV Spreadsheet
  • RSS Feed
(1 - 5 of 5)
EXPLORING VARIED APPROACHES FOR COUNTERING THE PRIVACY AND SECURITY RISKS OF THIRD-PARTY MOBILE APPLICATIONS
Exploring the Perceptions of Users-as-Beacons Systems: Developing and Deploying Real-Life Prototypes
Formal Techniques for Cyber Resilience: Modeling, Synthesis, and Verification
SECURING MOBILE HYBRID APPLICATIONS THROUGH CONFIGURATIONS - FIRST LINE OF DEFENSE
Security Improvement in Cloud Computing Environment through Memory Analysis