Networks and Security
201 – 210 of 263
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=""
width=""
height=""
allowtransparency="true"
frameborder="0">
</iframe>
- 2019
-
Mark
A Recommender System for User-specific Vulnerability Scoring (full version)
(2019)
- Other contribution › Miscellaneous
-
Mark
Privacy-enabled Recommendations for Software Vulnerabilities
(2019) 2019 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
The Asymptotic Complexity of Coded-BKW with Sieving Using Increasing Reduction Factors
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Efficient Pilot Allocation for URLLC Traffic in 5G Industrial IoT Networks
(2019) International Workshop on Resilient Networks Design and Modelling, RNDM 2019
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Network Lifetime Maximization in Wireless Mesh Networks for Machine-to-Machine Communication
(2019) In Ad Hoc Networks
- Contribution to journal › Article
-
Mark
A new SNOW stream cipher called SNOW-V
- Contribution to journal › Article
-
Mark
Vectorized linear approximations for attacks on SNOW 3G
(2019) 27th Annual Fast Software Encryption Conference, FSE 2020 In IACR Transactions on Symmetric Cryptology 2019(4). p.249-271
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Improved iterative decoding of QC-MDPC codes in the McEliece public key cryptosystem
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Analysis of Age of Information threshold violations
(2019) 22nd ACM International Conference on Modeling, Analysis
and Simulation of Wireless and Mobile Systems- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Sharing of vulnerability information among companies - a survey of Swedish companies
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
