Networks and Security
191 – 200 of 263
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=""
width=""
height=""
allowtransparency="true"
frameborder="0">
</iframe>
- 2019
-
Mark
Protecting OpenFlow Flow Tables with Intel SGX
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Guarding the Guards: Accountable Authorities in VANETs
(2019) 2018 IEEE Vehicular Networking Conference (VNC)
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Metadata filtering for user-friendly centralized biometric authentication
- Contribution to journal › Article
-
Mark
Massive MIMO C-Set Optimisation
(2019)
- Non-textual form › Software
-
Mark
The Asymptotic Complexity of Coded-BKW with Sieving Using Increasing Reduction Factors
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Efficient Pilot Allocation for URLLC Traffic in 5G Industrial IoT Networks
(2019) International Workshop on Resilient Networks Design and Modelling, RNDM 2019
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Network Lifetime Maximization in Wireless Mesh Networks for Machine-to-Machine Communication
(2019) In Ad Hoc Networks
- Contribution to journal › Article
-
Mark
A Recommender System for User-specific Vulnerability Scoring (full version)
(2019)
- Other contribution › Miscellaneous
-
Mark
Analysis of Age of Information threshold violations
(2019) 22nd ACM International Conference on Modeling, Analysis
and Simulation of Wireless and Mobile Systems- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Sharing of vulnerability information among companies - a survey of Swedish companies
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
