Search results

  • CSV Spreadsheet
  • RSS Feed
(1 - 11 of 11)
A framework for user-centric privacy management in smartphones regarding Bluetooth Low Energy beacons
An Approach Towards an Autonomic Computing Prototype Reference Architecture
Discovering Zero-day Attacks By Leveraging Cyber Threat Intelligence
HYBRID COMPARATIVE PREDICTIVE MODELING
Intrusion Detection and Deterrence for Critical Infrastructures
Mitigation of Crossfire Attacks in Software Defined Networks Using Random Forest Machine Learning Algorithm
More Efficient Learning in Traffic Grids Viewed as Complex Adaptive Systems Using Agent Based Modeling
Security Code Review with Static Analysis Techniques for the Detection and Remediation of Security Vulnerabilities
TOWARDS AN AGENT-BASED APPROACH TO SIMULATING HUMANS FALLING FOR PHISHING ATTACKS
User Centric Policy Management
Vulnerability Assessment and Policy Enforcement for Hybrid Mobile Applications