Networks and Security
171 – 180 of 235
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2019
-
Mark
The Asymptotic Complexity of Coded-BKW with Sieving Using Increasing Reduction Factors
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A Recommender System for User-specific Vulnerability Scoring (full version)
2019)(
- Other contribution › Miscellaneous
-
Mark
Analysis of Age of Information threshold violations
2019) 22nd ACM International Conference on Modeling, Analysis(
and Simulation of Wireless and Mobile Systems- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Sharing of vulnerability information among companies - a survey of Swedish companies
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Efficient Pilot Allocation for URLLC Traffic in 5G Industrial IoT Networks
2019) International Workshop on Resilient Networks Design and Modelling, RNDM 2019(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Network Lifetime Maximization in Wireless Mesh Networks for Machine-to-Machine Communication
2019) In Ad Hoc Networks(
- Contribution to journal › Article
-
Mark
On the Asymptotics of Solving the LWE Problem Using Coded-BKW with Sieving
(
- Contribution to journal › Article
-
Mark
A Key Recovery Reaction Attack on QC-MDPC
(
- Contribution to journal › Article
-
Mark
Privacy-enabled Recommendations for Software Vulnerabilities
2019) 2019 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Protecting OpenFlow Flow Tables with Intel SGX
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding