Search results

  • CSV Spreadsheet
  • RSS Feed
(1 - 5 of 5)
A Holistic Approach to Securing Memory Error Vulnerabilities in IoT Firmware
BIO-INSPIRED CYBER SECURITY AND THREAT ANALYTICS
Data Mining and Deep Learning Systems for Network Traffic Classification and Characterization at Scale
ENFORCING SECURITY POLICIES WITH DATA PROVENANCE TO ENRICH THE SECURITY OF IOT/ SMART BUILDING SYSTEM
Vulnerability Assessment and Policy Enforcement for Hybrid Mobile Applications