Search results

  • CSV Spreadsheet
  • RSS Feed
(1 - 9 of 9)
Automated formal analytics for smart grid security and resiliency
EXPLORING VARIED APPROACHES FOR COUNTERING THE PRIVACY AND SECURITY RISKS OF THIRD-PARTY MOBILE APPLICATIONS
Cyber Agility for Attack Deterrence and Deception
Integrating Random Linear Code Based Encryption Scheme Rlce Algorithm Into Post-quantum Openssl
A framework for user-centric privacy management in smartphones regarding Bluetooth Low Energy beacons
SECURING THE DATA STORAGE AND PROCESSING IN CLOUD COMPUTING ENVIRONMENT
Security Code Review with Static Analysis Techniques for the Detection and Remediation of Security Vulnerabilities
User Centric Policy Management
VISUAL ANALYTICS IN HIGH-DIMENSIONAL DATA WITH DICHOTOMOUS OUTCOME