Search results

  • CSV Spreadsheet
  • RSS Feed
(1 - 6 of 6)
A framework for user-centric privacy management in smartphones regarding Bluetooth Low Energy beacons
Cyber Agility for Attack Deterrence and Deception
EXPLORING VARIED APPROACHES FOR COUNTERING THE PRIVACY AND SECURITY RISKS OF THIRD-PARTY MOBILE APPLICATIONS
Integrating Random Linear Code Based Encryption Scheme Rlce Algorithm Into Post-quantum Openssl
Security Code Review with Static Analysis Techniques for the Detection and Remediation of Security Vulnerabilities
VISUAL ANALYTICS IN HIGH-DIMENSIONAL DATA WITH DICHOTOMOUS OUTCOME