Search

Search Constraints

Start Over You searched for: Keyword security Remove constraint Keyword: security

Search Results

1. Characterizations of Vulnerabilities and Countermeasures in Advanced Metering Infrastructure Collectors

open_access
Open Access

6. Security and Privacy Aspects in Wireless and Mobile Networks

open_access
Open Access

8. Leveraging Emerging Disk Functionality for New Security Services

open_access
Open Access

9. Secure Communications in Sensor Networks

open_access
Open Access

12. Secure Systems Development Using Security-Typed Languages

open_access
Open Access

13. Characterizing the Impact if Rigidity on the Security of Cellular Telecommunications Networks

open_access
Open Access

14. A STUDY OF SELECTED SECURITY ISSUES IN WIRELESS NETWORKS

open_access
Open Access

16. PROTOCOLS FOR SECURE COMMUNICATION AND TRAITOR TRACING IN ADVANCED METERING INFRASTRUCTURE

open_access
Open Access

19. Analysis Techniques for Mobile Operating System Security

open_access
Open Access

22. Mobile Agent-Based Energy-Efficient and Secure Global Information Systems

open_access
Open Access

26. Practical System Integrity Verification in Cloud Computing Environments

open_access
Open Access

28. Multi-step Attack Detection via Bayesian Modeling Under Model Parameter Uncertainty

open_access
Open Access

30. GABE: A Cloud Brokerage System for Service Selection, Accountability and Enforcement

open_access
Open Access

31. Analysis of Inter-Component Communication in Mobile Applications Through Retargeting

open_access
Open Access

33. Blockchain Smart Contracts in Megacity Logistics

open_access
Open Access

34. Automated IoT Security and Privacy Analysis

open_access
Open Access

36. Enhancing Ad-blocking Systems for Better Web Browsing Security and Privacy

open_access
Open Access

39. Building a Secure and Privacy-Preserving Smart Camera System

open_access
Open Access

41. Trustworthy Machine Learning: Learning under Security, Explainability and Uncertainty Constraints

open_access
Open Access

44. Evaluating Realistic Deployments of Trusted Execution Environments in the Tor Network

open_access
Open Access