Search results

  • CSV Spreadsheet
  • RSS Feed
(1 - 6 of 6)
BIO-INSPIRED CYBER SECURITY AND THREAT ANALYTICS
Development of a multi-layered botmaster based analysis framework
EXPLORING VARIED APPROACHES FOR COUNTERING THE PRIVACY AND SECURITY RISKS OF THIRD-PARTY MOBILE APPLICATIONS
Evaluating Accuracy and Robustness Impacts of Power User Attacks on Collaborative Recommender Systems
Optimal purchasing strategy for bandwidth: A buyer's perspective
THE DESIGN AND IMPLEMENTATION OF FUZZY QUERY PROCESSING ON SENSOR NETWORKS