Search Results
2. Towards Flexible and Realistic Insider Mission Simulation
Open Access
3. BATTLING CYBER ATTACKS WITH SOFTWARE CRASH DIAGNOSIS
Open Access
4. Regulating Programs’ Access To Privacy-Sensitive Sensors
Open Access
7. Advanced Software Obfuscation Techniques and Applications
Open Access
9. Towards Secure Solutions for Cloud Applications
Open Access