Search results

  • CSV Spreadsheet
  • RSS Feed
(1 - 20 of 29)
A Holistic Approach to Securing Memory Error Vulnerabilities in IoT Firmware
A framework for user-centric privacy management in smartphones regarding Bluetooth Low Energy beacons
AUTOMATIC UNIT TESTING TO DETECT SECURITY VULNERABILITIES IN WEB APPLICATIONS
An Approach Towards an Autonomic Computing Prototype Reference Architecture
Autonomous Malware Deception and Orchestration
Building an Efficient and Scalable Learning System on Heterogeneous Cluster
Developing Privacy Enhancing Technology For DNA Data Sharing In Public Genealogy Platforms
Discovering Zero-day Attacks By Leveraging Cyber Threat Intelligence
EXPLORING VARIED APPROACHES FOR COUNTERING THE PRIVACY AND SECURITY RISKS OF THIRD-PARTY MOBILE APPLICATIONS
Evaluating Co-Creation In Collaborative Drawing Using Creative Thinking Modes
HYBRID COMPARATIVE PREDICTIVE MODELING
Intrusion Detection and Deterrence for Critical Infrastructures
MULTIMODAL VISUALIZATION USING AUGMENTED REALITY AND LARGE DISPLAYS
More Efficient Learning in Traffic Grids Viewed as Complex Adaptive Systems Using Agent Based Modeling
PARTICIPANT SELECTION AND TASK ASSIGNMENT IN MOBILE CROWD SENSING
Photoplethysmographic Sensor-based Non-intrusive and Secure Smart Sensing and Applications
Privacy Preservation in Mobile Computing and Networking: Accessing, Sharing and Broadcasting
SECURING MOBILE HYBRID APPLICATIONS THROUGH CONFIGURATIONS - FIRST LINE OF DEFENSE
Security Code Review with Static Analysis Techniques for the Detection and Remediation of Security Vulnerabilities
Social and Location Based Routing in Delay Tolerant Networks